US7478028B2 - Method for automatically searching for functional defects in a description of a circuit - Google Patents

Method for automatically searching for functional defects in a description of a circuit Download PDF

Info

Publication number
US7478028B2
US7478028B2 US11/035,275 US3527505A US7478028B2 US 7478028 B2 US7478028 B2 US 7478028B2 US 3527505 A US3527505 A US 3527505A US 7478028 B2 US7478028 B2 US 7478028B2
Authority
US
United States
Prior art keywords
simulation
current state
state
circuit
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US11/035,275
Other versions
US20050131665A1 (en
Inventor
Chian-Min Richard Ho
Robert Kristianto Mardjuki
David Lansing Dill
Jing Chyuarn Lin
Ping Fai Yeung
Paul II Estrada
Jean-Charles Giomi
Tai An Ly
Kalyana C. Mulam
Lawrence Curtis Widdoes, Jr.
Paul Andrew Wilcox
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mentor Graphics Corp
Original Assignee
Mentor Graphics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mentor Graphics Corp filed Critical Mentor Graphics Corp
Priority to US11/035,275 priority Critical patent/US7478028B2/en
Publication of US20050131665A1 publication Critical patent/US20050131665A1/en
Application granted granted Critical
Publication of US7478028B2 publication Critical patent/US7478028B2/en
Assigned to 0IN DESIGN AUTOMATION, INC. reassignment 0IN DESIGN AUTOMATION, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YEUNG, PING FAI, DILL, DAVID LANSING, ESTRADA, PAUL, GIOMI, JEAN-CHARLES, HO, CHIAN-MIN R., LIN, JING CHYUARN, LY, TAI AN, MARDJUKI, ROBERT KRISTIANTO, MULAM, KALYANA C., WIDDOES, LAWRENCE CURTIS, JR., WILCOX, PAUL ANDREW
Assigned to MENTOR GRAPHICS CORPORATION reassignment MENTOR GRAPHICS CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: 0IN DESIGN AUTOMATION, INC.
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3183Generation of test inputs, e.g. test vectors, patterns or sequences
    • G01R31/318307Generation of test inputs, e.g. test vectors, patterns or sequences computer-aided, e.g. automatic test program generator [ATPG], program translations, test program debugging

Definitions

  • Microfiche appendices 1-58 (of 89 sheets and 4,945 frames) that are present in the file history of U.S. Pat. No. 6,292,765, contain source code in C language for programming a computer, are a part of the present disclosure, and are incorporated by reference herein in their entirety.
  • the present invention relates generally to a method implemented by a programmed computer for verifying the functionality of digital circuits during development and testing. More specifically, the invention relates to an automated method for searching for functional defects in a description of a circuit-under-verification.
  • Modern digital electronic circuits are typically designed at the register-transfer (RTL) level in hardware description languages such as Verilog (see “The Verilog Hardware Description Language”, Third Edition, Don E. Thomas and Philip R. Moorby, Kluwer Academic Publishers, 1996) or VHDL (see “A Guide to VHDL”, Stanley Mazor and Patricia Langstraat, Kluwer Academic Publishers, 1992).
  • a circuit description in such a hardware description language can be used to generate logic circuit elements as described, for example, in U.S. Pat. No. 5,661,661 granted to Gregory and Segal.
  • Such hardware description languages facilitate extensive simulation and emulation of the described circuit using commercially available products such as Verilog-XL available from Cadence Design Systems, San Jose, Calif., QuickHDL available from Mentor Graphics, Wilsonville, Oreg., Gemini CSX available from IKOS Systems, Cupertino, Calif., and System Realizer available from Quickturn Design Systems, Mountain View, Calif.
  • These hardware description languages also facilitate automatic synthesis of ASICs (see “HDL Chip Design”, by Douglas J. Smith, Doone Publications, 1996; “Logic Synthesis Using Synopsys”, Pran Kurup and Taher Abbasi, Kluwer Academic Publishers, 1997) using commercially available products such as Design Analyzer and Design Compiler, available from Synopsys, Mountain View, Calif.
  • Prior-art products for example, see the “Purify” product from Pure Atria, Sunnyvale, Calif., and the “Insure++” product from ParaSoft, Monrovia, Calif.
  • Prior-art products exist for testing software programs that may be written, for example in the programming language “C” described by Brian W. Kernighan and Dennis M. Ritchie in the book “The C Programming Language”, Second Edition, PTR Prentice Hall, 1988. See “Purify User's Guide, Version 4.0”, Pure Atria Corporation, 1996, and “Insure++ Automatic Runtime Debugger User's Guide”, ParaSoft Corporation, 1996.
  • FIG. 1A illustrates, in a data flow diagram, use of a directed search tool of this invention that searches for functional defects in a description of a circuit.
  • FIG. 1B illustrates, in a flow chart, steps performed by one particular implementation of the directed search tool of FIG. 1A .
  • FIG. 1C illustrates, in a state diagram, transitions between various states of a circuit under simulation.
  • FIG. 1D illustrates, in a graph of time versus use of test vectors, a simulation sequence of state transitions of FIG. 1C during performance of the method illustrated in FIG. 1B .
  • FIGS. 2A-2C illustrate, in state diagrams, examples of different controllers in a circuit under simulation.
  • FIG. 2D illustrates, in a flow chart, substeps performed in another implementation of step 4 of FIG. 1A .
  • FIG. 2E illustrates, in a flow chart, actions performed during implementation of substep 24 in FIG. 2D .
  • FIG. 2F illustrates, in a flow chart, actions performed in substep 25 in FIG. 2D .
  • FIG. 2G illustrates, in a flow chart, substeps performed by a test vector selection function invoked in action 44 of FIG. 2F .
  • FIG. 2H illustrates, in a circuit diagram, use of the test vector selector function to find a test vector.
  • FIG. 3A illustrates, in a data flow diagram, use of a search preparation tool to refine a description of the circuit-under verification.
  • FIG. 3B illustrates, in a flow chart, the steps performed by the search preparation tool of FIG. 3A .
  • FIG. 3C illustrates, in a graph, an arrangement (of two storage nodes and a logic node and connections) that can cause asynchronous behavior in a circuit-under-verification by clocking a storage element with an asynchronous signal.
  • FIG. 3D illustrates, in a graph form, a circuit-under-verification having nodes in the arrangement of FIG. 3C .
  • FIG. 3E illustrates, in a graph form, a circuit generated by performing the steps of FIG. 3B .
  • FIG. 3F illustrates, in a graph, an arrangement (of two storage nodes and a logic node and connections) that can cause asynchronous behavior in a circuit-under-verification by resetting a storage element with an asynchronous signal.
  • FIG. 3G illustrates, in a flow chart, substeps performed in one implementation of step 4 in FIG. 3A .
  • FIG. 3H illustrates, in a timing diagram, the temporal relationship between the substeps of FIG. 3G .
  • FIG. 4 illustrates, in a data flow diagram, use of a checker synthesis tool in a preparation tool for automatically generating checkers used during simulation by a directed search tool.
  • a computer when programmed in accordance with the invention performs the following steps: (1) simulates the functional behavior of a circuit (also called “circuit-under-verification”) using one or more test vectors (e.g. complete sets of signals at the input terminals of the circuit), (2) automatically restores the simulation to a current state (described below), and (3) simulates the functional behavior of the circuit with one or more additional test vectors.
  • the current state is represented, for example, by the set of signals in all storage elements of the circuit prior to the first simulating step.
  • the current state is different from the reset state (described below), and can be attained, for example, by simulating a sequence of other test vectors.
  • the programmed computer repeats the steps of automatically restoring and simulating until all test vectors in a group (obtained by applying a predetermined rule) have been used in the simulation.
  • the programmed computer can cause the simulation to successively transition to multiple states that can occur immediately after the pipeline stall by repeating the steps of (1) automatically restoring the state resulting from the pipeline stall and (2) simulating with a different test vector.
  • the programmed computer does not cause the simulation to pass through a “reset state” (i.e. a state of the simulation in response to a simulated reset signal applied to the circuit).
  • the programmed computer implements the step of automatically restoring by directly loading signal values of the current state into the simulated storage elements. Specifically, prior to simulation with the first test vector, the programmed computer reads and saves the current state. Thereafter, during the step of automatically restoring, the programmed computer directly loads the saved signal values into the storage elements, thereby to automatically restore the simulation directly to the current state.
  • the programmed computer implements the step of automatically restoring by restoring a state which is different from the current state and then using a sequence of test vectors to cause the simulation to transition to the current state through one or more states which are not reset states.
  • the computer can be programmed to successively simulate multiple next states that are reachable from the current state by using different test vectors.
  • the computer is programmed to use a predetermined rule to select a group of next states from the set of all possible next states and then to identify the test vectors that can cause the simulation to transition from the current state to each state in the selected group.
  • the programmed computer preferably uses a measure of functional verification of the circuit to select the group of next states.
  • the computer is programmed to use a predetermined rule to identify test vectors with certain specific properties, for example, test vectors which set specific input pins of the circuit to specific values, e.g. 0.
  • the computer is programmed to simulate a randomly generated test vector after each step of automatically restoring, in this case, the programmed computer does not use a predetermined rule to identify a test vector.
  • the circuit-under-verification includes a “controller” (i.e. a subcircuit) having a number of states, and the measure of verification identifies the states of the controller that have been reached in simulation.
  • the programmed computer selects, as the group of next states, the states of the controller that have yet to be reached.
  • the circuit-under-verification includes two controllers respectively capable of performing first state transitions, and second state transitions.
  • the programmed computer selects as the group of next states the states that require performance of a pair of first and second state transitions that have not previously been performed simultaneously at least once. Identifying test vectors based on such un-exercised pairs of state transitions increases functional verification of interactions between the two controllers. Specifically, the programmed computer finds functional defects that result from unusual interactions between two controllers, such as synchronization errors, resource conflicts, and “one-cycle-off” problems that are not normally detected by prior art methods.
  • the method of automatically restoring a current simulation state before applying a new test vector has additional advantages over the prior art method of sequentially applying test vectors. Specifically, in the prior art method, many of test vectors that are simulated result in repetition of behaviors which have already been exercised, thus they do not result in new behaviors of the circuit being exercised, and they do not result in finding new functional defects. Using the capability of directly and automatically restoring the simulation to a specific state, many test vectors can be efficiently simulated starting from a set of preferred states where new behaviors can be exercised using selected test vectors.
  • the programmed computer automatically generates descriptions of additional circuits (hereinafter “checkers”) that monitor portions of the circuit-under-verification, and flag behaviors of the portions in conformance with known defective behaviors.
  • each checker is coupled to an instance of an arrangement of circuit elements associated with a defective behavior.
  • Each checker monitors signals flowing to and from the instance and generates an error message on detecting the known defective behavior.
  • checkers flag an error as soon as the error occurs in simulation, emulation, or in a semiconductor die, because each checker monitors defective behavior of one instance of an arrangement in the circuit. Therefore, diagnosing errors flagged by automatically generated checkers is much easier than diagnosing errors flagged by end-to-end tests. Furthermore, functional verification can be terminated as soon as an error message is generated, thereby eliminating the generation and diagnosis of additional error messages (generated by continuing the functional verification). Hence, use of checkers as described herein eliminates the prior art need to simulate after an error occurs (e.g. in some cases for several hours) until an effect of the error is detected by an end-to-end test.
  • a computer 10 when programmed by software (hereinafter “directed search tool”) in accordance with this invention: simulates the functional behavior of a circuit (also called “circuit-under-verification”) using a test vector (as illustrated by step 3 ), automatically restores simulation to a non-reset state (as illustrated by step 4 ), and simulates the functional behavior using another test vector (as illustrated by step 5 ).
  • Computer 10 receives as inputs a description of the circuit-under-verification (e.g. in file 1 A) and a test vector (e.g. in file 1 B), and generates error messages (e.g. in file 6 ) describing functional defects found during simulation.
  • Files 1 A and 1 B have a description of circuitry and signal values similar or identical to prior art descriptions of circuitry and test vectors, for example, as described in the above-referenced “Validation Tools for Complex Digital Designs”, by Ho.
  • a directed search tool is intended to mean an appropriately programmed computer.
  • a programmed computer 10 is preferably a workstation computer that includes memory (e.g. 512 MB of random access memory), and central processing unit (CPU) of the type well known to a person skilled in the art of electronic design automation.
  • simulation of the functional behavior of a circuit is sometimes described herein as simply simulation of the circuit.
  • Such simulation can be performed by programming computer 10 with simulation software, such as Verilog-XL available from Cadence Design Systems, San Jose, Calif., QuickHDL available from Mentor Graphics, Wilsonville, Oreg., and Gemini CSX available from IKOS Systems, Cupertino, Calif.
  • directed search tool 2 ( FIG. 1B ) simulates a circuit having a single controller, e.g. controller 20 that has eight states S 1 -S 8 ( FIG. 1C ).
  • Directed search tool 2 identifies controller 20 in the circuit's description (e.g. in file 1 A) in response to a directive in file 1 C, for example, the directive $0In_init_search_group(“controller — 20_state_var”) which identifies “controller — 20_state_var” as a state variable.
  • the same eight states S 1 -S 8 are also used to identify the state of the simulation.
  • Controller 20 has a reset state S 1 that is the state of simulation at time T 1 ( FIG. 1D ) in response to reset at time T 0 .
  • the simulation transitions from state S 1 to state S 2 at time T 2 , for example in response to a test vector (e.g. in file 1 B) provided by the user.
  • a user can simply change the state of simulation, i.e. overwrite state S 1 with state S 2 .
  • directed search tool 2 saves (in step 12 ) the current state S 2 , and simulates (in step 3 ) the circuit (e.g. described in file 1 A) using a test vector V 0 (e.g. in file 1 B).
  • V 0 e.g. in file 1 B
  • the simulation transitions from state S 2 to state S 3 at time T 3 , and automatically to state S 4 after a delay, e.g. at time T 4 ( FIG. 1D ).
  • directed search tool 2 performs a step 4 ( FIG. 1B ) that includes substeps 14 A- 14 C, in this particular implementation.
  • step 14 A directed search tool 2 determines a measure of the functional verification completed in prior steps. For example, directed search tool 2 determines that states S 1 -S 4 (shown hatched in FIG. 1C ) have been simulated in prior steps.
  • substep 14 B directed search tool 2 uses the measure of functional verification (e.g. the simulated states S 1 -S 4 ) to identify the next states that can be reached from the current state (e.g. state S 2 ) but have not been simulated in prior steps.
  • directed search tool 2 enumerates all possible states S 1 -S 8 and then determines that the group of next states includes non-simulated states S 5 -S 8 ( FIG. 1C ).
  • directed search tool 2 applies a predetermined rule and identifies one or more test vectors required to transition from the current state S 2 to one or more of next states S 5 -S 8 (see FIG. 1C ).
  • directed search tool 2 finds (e.g. by checking the effect of all valid input values on the circuit in the current state) a first test vector V 1 (see FIG. 1D ) required to transition from state S 2 to state S 5 , and a second test vector V 2 required to transition from state S 2 to state S 7 .
  • directed search tool 2 sets the simulation at time T 5 ( FIG. 1D ) to the current state S 2 that was saved in step 12 , e.g. writes the value representing S 2 into storage elements that hold the state of simulation (as illustrated by a dashed arrow 19 in FIG. 1C ).
  • directed search tool 2 simulates (see step 1 in FIG. 1B ) the circuit using test vector V 1 that was identified in step 14 ( FIG. 1B ).
  • directed search tool 2 checks (see step 16 ) whether all of test vectors V 1 and V 2 (identified in step 4 ) have been used, and if not returns to step 4 (i.e. to substep 14 C), and uses the remaining test vector V 2 at time T 8 ( FIG. 1D ). If all of test vectors V 1 and V 2 have been used (e.g. at time T 10 ), and all state transitions have been simulated, directed search tool 2 stops the simulation (see step 17 in FIG. 1B ).
  • Directed search tool 2 simulates behavior of controller 20 (as identified in file 1 C) in states S 5 and S 7 that would otherwise not have been simulated by use of test vector V 0 (in file 1 B). Specifically, when controller 20 reaches state S 4 , it can proceed only to states S 6 and S 8 . Controller 20 transitions to states S 5 and S 7 only from state S 2 , and cannot reach S 5 and S 7 from S 4 , unless restored as described herein.
  • directed search tool 2 finds and exercises difficult-to-reach behaviors, because step 4 finds unvisted states from a “known good state” (i.e. a state that has already been simulated, e.g. current state S 2 ).
  • a known good state i.e. a state that has already been simulated, e.g. current state S 2 .
  • Such use of a known good state complements existing verification methodologies, because circuit designers find and fix functional errors found in response to typical stimuli that are provided in the test vectors (e.g. in file 1 B in FIG. 1A ).
  • directed search tool 2 saves (see step 18 ) one of the next states as the current state, and thereafter returns to step 4 (i.e. to substep 14 A) (described above).
  • the remaining next states are saved and used as current state in future applications of step 14 B.
  • directed search tool 2 attempts to exercise all state transitions, while using the measure of verification to minimize repetition of simulations that have already been performed.
  • Directed search tool 2 also minimizes the repetition of previously performed simulations by simply automatically restoring the simulation to a non-reset state (as illustrated in step 4 ).
  • use of the verification measure eliminates states S 3 and S 4 ( FIG.
  • a circuit-under-verification can include a number of such controllers (e.g. controllers 21 and 22 illustrated in FIGS. 2A and 2B ).
  • directed search tool 2 illustrated in FIG. 1B can be used multiple times to exercise each of such controllers individually.
  • functional defects that are likely to result from unusual interactions between such controllers cause, for example, synchronization errors, resource conflicts, and “one-cycle-off” problems that may not be found by such simulation of individual controllers.
  • directed search tool 2 implements, in step 4 , substeps 24 - 26 (see FIG. 2D ) that searches for such functional defects.
  • Substep 24 counts the simultaneous occurrences of pairs of state transitions, wherein each pair consists of a state transition of each of the two controllers.
  • directed search tool 2 enumerates all possible next states of controllers 21 and 22 , and the corresponding pairs of state transitions.
  • the current states of controllers 21 and 22 are respectively states A and D as illustrated by a paired state AD (see “paired” controller 23 in FIG. 2C ) that is obtained by pairing states A and D of controllers 21 and 22 .
  • the next states of controllers 21 and 22 are B and E respectively that are reached by respective transitions 21 T and 22 T ( FIGS. 2A and 2B ), as illustrated by paired transition 23 T ( FIG. 2C ).
  • directed search tool 2 applies a predetermined rule, using as input the count of step 24 to identify a test vector for simulation.
  • a predetermined rule using as input the count of step 24 to identify a test vector for simulation.
  • directed search tool 2 identifies (in step 25 ) a test vector for transitioning to state CD in response to the test vector 23 W.
  • directed search tool 2 automatically restores the simulation to the current state BE.
  • Step 25 is illustrated by the function “zi_dpli_poke” in module sd, at lines 2840 to 3156 of microfiche Appendix 41.
  • directed search tool 2 implements substep 24 by performing actions 31 - 35 ( FIG. 2E ). Specifically, directed search tool 2 reads the current state of the circuit-under-verification from the simulator (as illustrated by action 31 ). Action 31 is illustrated by the function “zi_dpli_peek” in module sd, at lines 3272 to 3327 of microfiche Appendix 41. In this particular action, the signal in each storage element (e.g. registers 61 - 65 in FIG. 2H ) of the circuit is read, and all the signals together form the state of the circuit. Next, directed search tool 2 extracts from the current state of the circuit-under-verification, the state of each controller (as illustrated by action 32 ).
  • Action 32 is illustrated by the function “zi_fsmdb_extract_state” in module fsmdb, at lines 3327 to 3351 of microfiche Appendix 23. Thereafter, if any controller state is found to be simulated for the first time, directed search tool 2 enumerates all possible states that can be reached from that newly simulated state, and also enumerates all related state transitions (as illustrated in action 34 ).
  • Action 34 is illustrated by the function “zi_ienum_arcs” in module satsetup, at lines 2087 to 2137 of microfiche Appendix 40.
  • directed search tool 2 composes a state transition pair for the most recently performed simulation step, and increments a count of the state transition pair (as illustrated in action 35 ).
  • Action 35 is illustrated by the function “zi_fsmdb_srchgrp_update” in module fsmdb, at lines 5122 to 5208 of microfiche Appendix 23. If the controller state extracted in action 32 was previously simulated, directed search tool 2 skips performing action 34 and directly performs action 35 (described above).
  • step 32 extracts the state of each of the user defined controllers (e.g. in file 1 C), finding controller 21 to be in state B and controller 22 to be in state E respectively. Since this is the first time that the states B and E respectively have been simulated, therefore step 34 is applied to both controllers. Hence, controller 21 is enumerated to find all the next states from state B, namely B and C, and controller 22 is enumerated to find all the next states from state E, namely D. Step 34 is performed in preparation for step 42 ( FIG. 2F ). Thereafter, step 35 composes the transition pair that was covered, in this example, from state AD to state BE, and increments a count indicating the number of times the transition AD to BE has been covered in simulation.
  • step 35 composes the transition pair that was covered, in this example, from state AD to state BE, and increments a count indicating the number of times the transition AD to BE has been covered in simulation.
  • directed search tool 2 performs actions 41 - 45 ( FIG. 2F ). Specifically, directed search tool 2 automatically scans (in action 41 ) all states that have been simulated. Action 41 is illustrated by the function “zi_score_state” in module srch_ctrl, at lines 1081 to 1744 of microfiche Appendix 45. Thereafter, directed search tool 2 examines the verification measures (as discussed above in reference to substep 24 ) for all state transitions that start from the current state. Next, directed search tool 2 checks whether any of the state transitions has not yet been performed during the simulation (as illustrated by action 43 ).
  • directed search tool 2 presents the current state and all state transitions that have not been performed to a function 50 ( FIG. 2G ) for identification of test vectors.
  • Action 43 uses functions “zi_fsmdb_srchgrp_lookup” in module fsmdb, at lines 5450 to 5544 of microfiche Appendix 23, and function “zi_fsmdb_ifsm_lookup_state” in module fsmdb, at lines 3363 to 3399 of microfiche Appendix 23.
  • Action 43 is illustrated by function “zi_candidate_new_arc” in module srch_ctrl, at lines 1800 to 1860 of microfiche Appendix 45.
  • Function 50 performs steps 51 - 59 to identify test vectors that exercise one or more of the not-yet-performed state transitions. Specifically, in step 51 , function 50 starts executing, and performs any necessary initialization. An example of the initialization task is illustrated by the function “zi_sat_setup” in module satsetup, at lines 3713 to 3778 of microfiche Appendix 40. Thereafter, in step 52 , function 50 sets goals to make registers (hereinafter “state registers”) of the circuit-under-verification take values which will result in performance of a not-yet-performed state transition.
  • state registers hereinafter “state registers”
  • Step 52 is illustrated by the function “zi_sat_set_goals” in module sat, at lines 1915 to 1972 of microfiche Appendix 39.
  • function 50 takes a goal, and traverses the circuit backwards from an input terminal (e.g., for example from the “Q” terminal of a flip-flop 65 in a circuit 60 ( FIG. 2H ).
  • Step 53 is illustrated by the function “zi_sat_backtrace” in module sat, at lines 1590 to 1625 of microfiche Appendix 39.
  • circuit 60 all circuit elements reached by the backward traversal are illustrated in FIG. 2H within a space called “cone of logic”.
  • the cone of logic is delimited by lines 65 A and 65 B that intersect at the “Q” terminal of flip-flop 65 , and fan out backward to include storage elements, e.g. registers 61 - 64 , groups of logic elements 66 and 67 , and input terminals 68 and 69 .
  • the cone of logic is transitive, i.e. the cone of logic of flip-flop 65 includes the fan-in of flip-flop 63 because flip-flop 63 fans-out to the “Q” terminal of flip-flop 65 .
  • Each level of flip-flops in the cone of logic is considered to be one cycle of logic.
  • the cone of logic extends backwards for some number of cycles of logic and is terminated by a maximum cycle number that is set by a budget measure, either by the user or automatically.
  • the cone of logic is established by step 51 for each of the state registers for which a goal exists. Thereafter, all register values outside the cone of logic are considered constants. Registers inside the cone of logic are also considered constants if there are no input terminals that can change values to affect the value of the register.
  • step 54 function 50 checks if a change in a signal at an input terminal (e.g. one of terminals 68 and 69 ) is sufficient to satisfy the goal. If so, function 50 selects test vectors necessary to set the input terminal to the required signal value (as illustrated in step 55 ), and goes to step 58 to check if more goals need to be satisfied.
  • an input terminal e.g. one of terminals 68 and 69
  • step 54 if the goal cannot be satisfied, function 50 checks if a signal in any one of the registers 61 - 64 in the cone of logic can be changed to satisfy the goal (e.g. if the values are symbols of the type used in symbolic simulation). If none of the values in registers 61 - 64 can be changed (e.g. because the values are constants), function 50 goes to step 59 to check if any more state transitions remain not-yet-performed (as illustrated by step 59 ). If so, function 50 returns to step 52 (described above).
  • step 52 if in step 52 if a register does not have a constant value, function 50 sets the goal to change the register to the necessary value required to satisfy the current goal (as illustrated in step 57 ) and thereafter returns to step 54 if more goals remain to be satisfied.
  • the steps 54 - 57 are illustrated by the function “zi_sat_satisfy” in module sat, at lines 1985 to 2064 of microfiche Appendix 39.
  • function 50 is assisted by performing a symbolic simulation of the circuit in parallel with the normal circuit simulation in steps 3 and 5 of FIG. 1A .
  • a symbolic simulator is illustrated by the function “zi_syms_run” in module ss, at lines 2416 to 2536 of microfiche Appendix 46.
  • function 50 simply picks an appropriate value in the range represented by the symbol that satisfies the goal. Therefore, symbolic simulation eliminates the need to traverse backward all the way to the input terminal that originated the range of values at the storage element.
  • controller controllers mentioned heretofore refer to controllers in the circuit
  • additional controller descriptions called “protocol controllers”
  • the verification measure in the above description can be a count of the simultaneous performance of a state transition of a controller of the circuit and a state transition of a protocol controller.
  • directed search tool 2 implements in step 32 ( FIG. 2E ), extraction of the both the state of a controller of the circuit and the state of a protocol controller.
  • step 32 extracts the protocol controller state in the same manner as it extracts the circuit state.
  • a computer 70 is programmed with a search preparation tool 71 that automatically scans (as illustrated by step 71 A) descriptions of circuitry (e.g. in file 1 A) to generate a graph, and thereafter automatically traverses (see step 71 B) the graph to generate a description that is refined, e.g. by eliminating unnecessary circuitry, such as a declared register that is the destination of an assignment statement in a Verilog “always” statement.
  • search preparation tool 71 automatically creates a parse tree (see substep 76 ) and thereafter traverses (see substep 77 ) the parse tree to create the graph.
  • Substeps 76 and 77 are similar or identical to substeps 210 and 220 described in reference to FIG. 2 in the U.S. patent application Ser. No. 08/955,329 incorporated by reference above. Therefore, search preparation tool 71 generates a description (e.g. in file 73 A in FIG. 3A ) that describes circuit elements remaining in the graph resulting from flattening and load refinement (described in reference to actions 408 and 409 in FIG. 4A in the U.S. patent application Ser. No. 08/955,329 incorporated by reference above).
  • search preparation tool 71 generates a description (e.g. in file 73 A in FIG. 3A ) that describes circuit elements remaining in the graph resulting from flattening and load refinement (described in reference to actions 408 and 409 in FIG. 4A in the U.S. patent application Ser. No. 08/955,329 incorporated by reference above).
  • search preparation tool 71 also describes (e.g. in file 73 A) one or more circuits (also called “restoration circuits”) that may be required (depending on the circuit-under-verification) for restoring signals (also called “asynchronous signals”) that occur in the clock cycle immediately following the current state, and that may not occur after restoration of simulation to the current state.
  • directed search tool 72 saves the state at each clock cycle, and uses the restoration circuits and the state (hereinafter “previous state”) that immediately precedes the current state to recreate such asynchronous signals after state restoration.
  • previous state One implementation of such a directed search tool 72 is illustrated by function “zi_srch_ctrl” in module srch_ctrl, at lines 2024 to 2616 in microfiche Appendix 45.
  • search preparation tool 71 automatically examines the graph for instances of an arrangement that can result in an asynchronous signal being used to clock a storage element, or to reset a storage element. For example, search preparation tool 71 automatically traverses the graph to find all instances of an arrangement 86 that includes two storage nodes 86 A and 86 C, wherein an output terminal D of a first storage node 86 A is coupled to a clock terminal C of second node 86 C, e.g. through a logic node 86 B. In one example, search preparation tool 71 scans the following description of circuit 87 ( FIG. 3D ) in Verilog provided in file 1 A ( FIG. 3A ):
  • Circuit 87 ( FIG. 3D ) is in state S 1 ( FIG. 1C ) at a rising edge in a clock signal CLOCK (e.g. at time T 0 in FIG. 3H ), and signal INP 1 goes active at the Q terminal of storage element REG 1 ( FIG. 3D ) a short time thereafter (e.g. at time T 1 ). Therefore, storage element REG 1 drives a signal ASYNC 1 active a short time after the next rising edge (e.g. at time T 2 ) in clock signal CLOCK (e.g. at time T 3 ). The rising edge in signal ASYNC 1 causes storage element REG 2 to take the value of INP 2 at time T 6 . Thereafter, when circuit 87 is restored to state S 2 (e.g.
  • the signal ASYNC 1 does not have a rising edge.
  • ASYNC 1 is active and INP 2 is inactive.
  • state S 2 is restored to the simulator, for example using a C language interface to the simulator as illustrated by calls to the function “acc_set_value” in module sd, at lines 3264 , 3607 and 3729 in microfiche Appendix 41.
  • the step of restoring causes the values of all signals to take their respective values at time T 6 when state S 2 was first simulated. Consequently, INP 2 becomes active and ASYNC 1 remains active which causes REG 2 to fail to clock a new value when simulated to state S 5 in FIG. 1C because it does not observe a rising edge on ASYNC 1 .
  • the rising edge in signal ASYNC 1 causes storage element REG 2 to supply during the transition from state S 2 to state S 3 (e.g. at time T 6 in FIG. 3H ) a signal INP 2 received at the Q terminal as the output signal OUT 1 at the D terminal.
  • storage element REG 2 fails to supply (e.g. during the transition from state S 2 to state S 5 ) signal INP 2 as output signal OUT 1 . Therefore, in this example, signal OUT 1 is low prior to the restoration step at time T 9 and remains low at time T 13 during simulation after restoration.
  • the reference numerals T 9 -T 16 ( FIG. 3H ) identify the simulation time after restoring state S 2 and correspond to the reference numerals T 2 -T 6 of simulation time after state S 2 without restoration.
  • search preparation tool 71 To recreate an asynchronous signal (e.g. signal ASYNC 1 ), search preparation tool 71 generates a description of a restoration circuit that includes a multiplexer (e.g. multiplexer 88 M) that has two input terminals, a control terminal and an output terminal, wherein the output terminal is coupled to the second storage element (e.g. storage element REG 2 ) and a first input terminal is coupled to the first storage element REG 1 .
  • Each restoration circuit also includes (1) a first storage element (also called “previous value register”, e.g. element 88 A) coupled to the second input terminal of multiplexer and (2) a second storage element (also called “asynchronous MUX select register”, e.g. element 88 B) coupled to the control terminal of multiplexer.
  • search preparation tool 71 finds that a storage element REG 2 in circuit 87 has a clock terminal that is coupled to storage element REG 1 in the above-described arrangement 86 (wherein there is no logic node in circuit 87 ), as illustrated in function “zi_hout_mark_gcm_asynch_reset” in module hout, at lines 9016 to 9094 in microfiche Appendix 28.
  • search preparation tool 71 generates the following instructions in Verilog for a restoration circuit 88 ( FIG. 3E ) that assists in restoration of asynchronous signals in the circuit-under-verification (by directed search tool 72 in step 4 ; see FIG. 3A ).
  • directed search tool 72 performs substeps 81 - 85 ( FIG. 3G ) in step 4 ( FIG. 3A ) using restoration circuits (e.g. circuit 88 ) generated by search preparation tool 71 to generate at least a majority of the asynchronous signals (all asynchronous signals in one example).
  • restoration circuits e.g. circuit 88
  • directed search tool 72 forces the values of a majority of the storage elements (in one example all the storage elements) in the circuit to the values that were held in the current state (e.g. in state S 2 ).
  • directed search tool 72 forces each previous value register to hold the value at the first storage node in the arrangement (e.g. the value at storage node 86 A) in the previous state. Specifically, in circuit 87 ( FIG. 3E ), directed search tool 72 causes previous value register 88 A to hold the value in storage element REG 1 in state S 1 , e.g. the value 0. Thereafter, in substep 83 , directed search tool 72 forces each asynchronous MUX select register to the value that causes the multiplexer to pass to the clock terminal of the second storage element the signal from the previous value register. Therefore, in the above-described example, directed search tool 72 drives the signal CLOCKS active that in turn causes storage element 88 B to drive signal SELECT active (as illustrated at time T 10 in FIG. 3H ).
  • step 84 directed search tool 72 forces the simulation to proceed for a non-zero time period, specifically the simulation time needed for the signal PREV from storage element 88 to go through multiplexer 88 M and reach the clock terminal of storage element REG 2 .
  • the time period can be, for example, one nanosecond of simulation time, even if the delay through multiplexer 88 M is zero. Therefore, at time T 11 the signal ASYNC 2 at the clock terminal of storage element REG 2 goes low as illustrated at time T 11 in FIG. 3H .
  • directed search tool 72 forces each asynchronous mux select register to the value that causes the multiplexer to pass the signal at the first storage node 86 A ( FIG. 3A ) in state S 2 .
  • directed search tool 72 causes storage element 88 B to drive the signal SELECT inactive that in turn causes multiplexer 88 M to pass the signal of value 1 from storage element REG 1 to the clock terminal of storage element REG 2 .
  • signal ASYNC 2 goes high at the clock terminal of storage element REG 2 at time T 12 . Therefore, storage element REG 2 receives, at the clock terminal, a rising edge in the signal at time T 12 that in turn causes storage element REG 2 to supply as signal OUT 2 the signal INP 2 .
  • the directed search tool 2 can be combined with automatically generated checkers as illustrated in FIG. 4 .
  • the automatically generated checkers are created by simulation preparation tool 91 from the circuit description by automatic conversion (see step 92 A), automatic examination (see step 92 B) and automatic generation (see step 92 C), as described in the above-referenced U.S. patent application Ser. No. 08/955,329. Thereafter, the checkers (e.g. in files 95 A- 95 M) are simulated with simulation of the circuit (as described in file 73 A) by directed search tool 72 . During the directed search, the checkers flag known defective behavior.
  • Appendices 1-58 in the microfiche incorporated by reference above contain software listings and documentation as follows:
  • srch_ctrl 16 dsesym Data structures and utilities to implement a symbol table for search, used by stmgr and sd 17 dsh Command shell for a user to interface to search preparation tool 18
  • elab Converts the parse tree into netlist, called from dsh 19 er Data structures and utilities to implement Verilog value change dump, used by seedex and sd 20
  • fsmdb 28 hout Writes out checker modules in Verilog using support routines, called from dsh 29 hsh Command shell for a user to interface to the checker synthesis tool 30 list Data structures and utilities to implement linked lists, used by many modules, e.g. srch_ctrl 31 mem Utilities to manage memory allocation, used by many modules, e.g. srch_ctrl 32 mesg Utilities to print messages, used by many modules, e.g.
  • srch_ctrl 33 Analyzes the netlist, called from dsh 34 osd Utilities to print messages, used by sd 35 osd_nonpli Utilities to print messages, used by sd 36 pm Data structures and utilities for protocol analysis and interpretation, used by srch_ctrl and seedex 37 pt Data structures and utilities for building a parse tree, used by nl and pm 38 random Utilities for generating pseudo- random numbers, used by srch_ctrl 39 sat Data structures and utilities for search satisfiability analysis, used by satsetup 40 satsetup Data structures and utilities to prepare for search satisfiability analysis, used by srch_ctrl 41 sd Utilities to interface search tool to C-language interface of Verilog, called by the simulator to setup parameters, start the search tool and read & set the state of the circuit in simulation 42 seedex Data structures and utilities for seed
  • EDA electronic design automation
  • Other embodiments of a method in accordance with the invention include one or more of the following steps: automatically restoring a current state of simulation by applying a test vector that causes the simulation to return to the current state after one or more simulation cycles without entering a reset state; retaining in computer memory and using (for example, in step 41 of FIG.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Tests Of Electronic Circuits (AREA)
  • Design And Manufacture Of Integrated Circuits (AREA)

Abstract

A programmed computer searches for functional defects in a description of a circuit undergoing functional verification in the following manner. The programmed computer simulates the functional behavior of the circuit in response to a test vector, automatically restores the state of the simulation without causing the simulation to pass through a reset state, and then simulates the functional behavior of the circuit in response to another test vector. A predetermined rule can be used to identify test vectors to be simulated, and the predetermined rule can depend upon a measure of functional verification, including the number of times during simulation when a first state transition is performed by a first-controller at the same time as a second state transition is performed by a second controller. During simulation of the test vectors, manually generated tests or automatically generated checkers can monitor portions of the circuit for defective behavior.

Description

CROSS-REFERENCE TO PRIORITY APPLICATION
This application is a continuation of and incorporates by reference herein the entire disclosure of U.S. patent application Ser. No. 09/849,055 filed May 4, 2001 now issued as U.S. Pat. No. 6,885,983 that is in turn a continuation of U.S. patent application Ser. No. 08/954,765 filed Oct. 20, 1997 now issued as U.S. Pat. No. 6,292,765.
CROSS-REFERENCE TO RELATED APPLICATION
This application is related to and incorporates by reference herein in its entirety the commonly owned U.S. patent application Ser. No. 08/955,329 filed by Tai An Ly, et al., and entitled “A Method for Automatically Generating Checkers for Finding Functional Defects in a Description of a Circuit”, now U.S. Pat. No. 6,175,946, issued Jan. 16, 2001.
CROSS-REFERENCE TO MICROFICHE APPENDICES
Microfiche appendices 1-58 (of 89 sheets and 4,945 frames) that are present in the file history of U.S. Pat. No. 6,292,765, contain source code in C language for programming a computer, are a part of the present disclosure, and are incorporated by reference herein in their entirety.
A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the patent and trademark office patent files or records, but otherwise reserves all copyright rights whatsoever.
FIELD OF THE INVENTION
The present invention relates generally to a method implemented by a programmed computer for verifying the functionality of digital circuits during development and testing. More specifically, the invention relates to an automated method for searching for functional defects in a description of a circuit-under-verification.
BACKGROUND OF THE INVENTION
Modern digital electronic circuits are typically designed at the register-transfer (RTL) level in hardware description languages such as Verilog (see “The Verilog Hardware Description Language”, Third Edition, Don E. Thomas and Philip R. Moorby, Kluwer Academic Publishers, 1996) or VHDL (see “A Guide to VHDL”, Stanley Mazor and Patricia Langstraat, Kluwer Academic Publishers, 1992). A circuit description in such a hardware description language can be used to generate logic circuit elements as described, for example, in U.S. Pat. No. 5,661,661 granted to Gregory and Segal.
Such hardware description languages facilitate extensive simulation and emulation of the described circuit using commercially available products such as Verilog-XL available from Cadence Design Systems, San Jose, Calif., QuickHDL available from Mentor Graphics, Wilsonville, Oreg., Gemini CSX available from IKOS Systems, Cupertino, Calif., and System Realizer available from Quickturn Design Systems, Mountain View, Calif. These hardware description languages also facilitate automatic synthesis of ASICs (see “HDL Chip Design”, by Douglas J. Smith, Doone Publications, 1996; “Logic Synthesis Using Synopsys”, Pran Kurup and Taher Abbasi, Kluwer Academic Publishers, 1997) using commercially available products such as Design Analyzer and Design Compiler, available from Synopsys, Mountain View, Calif.
As described in “Architecture Validation for Processors”, by Richard C. Ho, C. Han Yang, Mark A. Horowitz and David L. Dill, Proceedings 22nd Annual International Symposium on Computer Architecture, pp. 404-413, June 1995, “modern high-performance microprocessors are extremely complex machines which require substantial validation effort to ensure functional correctness prior to tapeout” (see page 404). As further described in “Validation Coverage Analysis for Complex Digital Designs” by Richard C. Ho and Mark A. Horowitz, Proceedings 1996 IEEE/ACM International Conference on Computer-Aided Design, pp. 146-151, November 1996, “the functional validation of state-of-the-art digital design is usually performed by simulation of a register-transfer-level model” (see page 146).
It is well known to monitor the operation of a simulation test by using, for example, “snoopers” generated manually as described at page 463, column 2, in “Hardware/Software Co-Design of the Stanford FLASH Multiprocessor”, by Mark Heinrich, David Ofelt, Mark A. Horowitz, and John Hennessy, Proceedings of the IEEE, Vol 85, No. 3, pp. 455-466, March 1997, and in “Functional Verification Methodology for the PowerPC 604 Microprocessor”, by James Monaco, David Holloway and Rajesh Raina, Proceedings 33rd IEEE Design Automation Conference, pp. 319-324, June 1996.
Another prior art system monitors the operation of a simulation test by using a “golden model” that is “written without reference to the RTL” and is “co-simulated using the same set of test vectors”, as described by Chian-Min Richard Ho, in “Validation Tools for Complex Digital Designs”, Ph.D. Dissertation, Stanford University Computer Science Department, November 1996 (at page 6, Section 2.1).
Prior-art products (for example, see the “Purify” product from Pure Atria, Sunnyvale, Calif., and the “Insure++” product from ParaSoft, Monrovia, Calif.) exist for testing software programs that may be written, for example in the programming language “C” described by Brian W. Kernighan and Dennis M. Ritchie in the book “The C Programming Language”, Second Edition, PTR Prentice Hall, 1988. See “Purify User's Guide, Version 4.0”, Pure Atria Corporation, 1996, and “Insure++ Automatic Runtime Debugger User's Guide”, ParaSoft Corporation, 1996.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1A illustrates, in a data flow diagram, use of a directed search tool of this invention that searches for functional defects in a description of a circuit.
FIG. 1B illustrates, in a flow chart, steps performed by one particular implementation of the directed search tool of FIG. 1A.
FIG. 1C illustrates, in a state diagram, transitions between various states of a circuit under simulation.
FIG. 1D illustrates, in a graph of time versus use of test vectors, a simulation sequence of state transitions of FIG. 1C during performance of the method illustrated in FIG. 1B.
FIGS. 2A-2C illustrate, in state diagrams, examples of different controllers in a circuit under simulation.
FIG. 2D illustrates, in a flow chart, substeps performed in another implementation of step 4 of FIG. 1A.
FIG. 2E illustrates, in a flow chart, actions performed during implementation of substep 24 in FIG. 2D.
FIG. 2F illustrates, in a flow chart, actions performed in substep 25 in FIG. 2D.
FIG. 2G illustrates, in a flow chart, substeps performed by a test vector selection function invoked in action 44 of FIG. 2F.
FIG. 2H illustrates, in a circuit diagram, use of the test vector selector function to find a test vector.
FIG. 3A illustrates, in a data flow diagram, use of a search preparation tool to refine a description of the circuit-under verification.
FIG. 3B illustrates, in a flow chart, the steps performed by the search preparation tool of FIG. 3A.
FIG. 3C illustrates, in a graph, an arrangement (of two storage nodes and a logic node and connections) that can cause asynchronous behavior in a circuit-under-verification by clocking a storage element with an asynchronous signal.
FIG. 3D illustrates, in a graph form, a circuit-under-verification having nodes in the arrangement of FIG. 3C.
FIG. 3E illustrates, in a graph form, a circuit generated by performing the steps of FIG. 3B.
FIG. 3F illustrates, in a graph, an arrangement (of two storage nodes and a logic node and connections) that can cause asynchronous behavior in a circuit-under-verification by resetting a storage element with an asynchronous signal.
FIG. 3G illustrates, in a flow chart, substeps performed in one implementation of step 4 in FIG. 3A.
FIG. 3H illustrates, in a timing diagram, the temporal relationship between the substeps of FIG. 3G.
FIG. 4 illustrates, in a data flow diagram, use of a checker synthesis tool in a preparation tool for automatically generating checkers used during simulation by a directed search tool.
SUMMARY
A computer, when programmed in accordance with the invention performs the following steps: (1) simulates the functional behavior of a circuit (also called “circuit-under-verification”) using one or more test vectors (e.g. complete sets of signals at the input terminals of the circuit), (2) automatically restores the simulation to a current state (described below), and (3) simulates the functional behavior of the circuit with one or more additional test vectors. The current state is represented, for example, by the set of signals in all storage elements of the circuit prior to the first simulating step. The current state is different from the reset state (described below), and can be attained, for example, by simulating a sequence of other test vectors.
In one embodiment, the programmed computer repeats the steps of automatically restoring and simulating until all test vectors in a group (obtained by applying a predetermined rule) have been used in the simulation. As an example, if the current state of simulation results from a pipeline stall, the programmed computer can cause the simulation to successively transition to multiple states that can occur immediately after the pipeline stall by repeating the steps of (1) automatically restoring the state resulting from the pipeline stall and (2) simulating with a different test vector.
During the step of automatically restoring, the programmed computer does not cause the simulation to pass through a “reset state” (i.e. a state of the simulation in response to a simulated reset signal applied to the circuit). In one embodiment, the programmed computer implements the step of automatically restoring by directly loading signal values of the current state into the simulated storage elements. Specifically, prior to simulation with the first test vector, the programmed computer reads and saves the current state. Thereafter, during the step of automatically restoring, the programmed computer directly loads the saved signal values into the storage elements, thereby to automatically restore the simulation directly to the current state. In another embodiment, the programmed computer implements the step of automatically restoring by restoring a state which is different from the current state and then using a sequence of test vectors to cause the simulation to transition to the current state through one or more states which are not reset states.
By use of the step of automatically restoring as described herein to return to the current state, the computer can be programmed to successively simulate multiple next states that are reachable from the current state by using different test vectors. Specifically, in one embodiment, the computer is programmed to use a predetermined rule to select a group of next states from the set of all possible next states and then to identify the test vectors that can cause the simulation to transition from the current state to each state in the selected group. When applying the predetermined rule, the programmed computer preferably uses a measure of functional verification of the circuit to select the group of next states.
In another embodiment, the computer is programmed to use a predetermined rule to identify test vectors with certain specific properties, for example, test vectors which set specific input pins of the circuit to specific values, e.g. 0.
In still another embodiment, the computer is programmed to simulate a randomly generated test vector after each step of automatically restoring, in this case, the programmed computer does not use a predetermined rule to identify a test vector.
In a first example, the circuit-under-verification includes a “controller” (i.e. a subcircuit) having a number of states, and the measure of verification identifies the states of the controller that have been reached in simulation. The programmed computer selects, as the group of next states, the states of the controller that have yet to be reached.
In a second example, the circuit-under-verification includes two controllers respectively capable of performing first state transitions, and second state transitions. The programmed computer selects as the group of next states the states that require performance of a pair of first and second state transitions that have not previously been performed simultaneously at least once. Identifying test vectors based on such un-exercised pairs of state transitions increases functional verification of interactions between the two controllers. Specifically, the programmed computer finds functional defects that result from unusual interactions between two controllers, such as synchronization errors, resource conflicts, and “one-cycle-off” problems that are not normally detected by prior art methods.
The method of automatically restoring a current simulation state before applying a new test vector has additional advantages over the prior art method of sequentially applying test vectors. Specifically, in the prior art method, many of test vectors that are simulated result in repetition of behaviors which have already been exercised, thus they do not result in new behaviors of the circuit being exercised, and they do not result in finding new functional defects. Using the capability of directly and automatically restoring the simulation to a specific state, many test vectors can be efficiently simulated starting from a set of preferred states where new behaviors can be exercised using selected test vectors.
In one embodiment, the programmed computer automatically generates descriptions of additional circuits (hereinafter “checkers”) that monitor portions of the circuit-under-verification, and flag behaviors of the portions in conformance with known defective behaviors. During simulation, each checker is coupled to an instance of an arrangement of circuit elements associated with a defective behavior. Each checker monitors signals flowing to and from the instance and generates an error message on detecting the known defective behavior.
Use of automatically generated checkers in combination with automatic state restoration and simulation as described herein has several advantages. Specifically, the checkers flag an error as soon as the error occurs in simulation, emulation, or in a semiconductor die, because each checker monitors defective behavior of one instance of an arrangement in the circuit. Therefore, diagnosing errors flagged by automatically generated checkers is much easier than diagnosing errors flagged by end-to-end tests. Furthermore, functional verification can be terminated as soon as an error message is generated, thereby eliminating the generation and diagnosis of additional error messages (generated by continuing the functional verification). Hence, use of checkers as described herein eliminates the prior art need to simulate after an error occurs (e.g. in some cases for several hours) until an effect of the error is detected by an end-to-end test.
DETAILED DESCRIPTION
A computer 10 (FIG. 1A), when programmed by software (hereinafter “directed search tool”) in accordance with this invention: simulates the functional behavior of a circuit (also called “circuit-under-verification”) using a test vector (as illustrated by step 3), automatically restores simulation to a non-reset state (as illustrated by step 4), and simulates the functional behavior using another test vector (as illustrated by step 5). Computer 10 receives as inputs a description of the circuit-under-verification (e.g. in file 1A) and a test vector (e.g. in file 1B), and generates error messages (e.g. in file 6) describing functional defects found during simulation. Files 1A and 1B have a description of circuitry and signal values similar or identical to prior art descriptions of circuitry and test vectors, for example, as described in the above-referenced “Validation Tools for Complex Digital Designs”, by Ho.
Hereinafter, all references to a directed search tool are intended to mean an appropriately programmed computer. Such a programmed computer 10 is preferably a workstation computer that includes memory (e.g. 512 MB of random access memory), and central processing unit (CPU) of the type well known to a person skilled in the art of electronic design automation. Moreover, simulation of the functional behavior of a circuit is sometimes described herein as simply simulation of the circuit. Such simulation can be performed by programming computer 10 with simulation software, such as Verilog-XL available from Cadence Design Systems, San Jose, Calif., QuickHDL available from Mentor Graphics, Wilsonville, Oreg., and Gemini CSX available from IKOS Systems, Cupertino, Calif.
In one embodiment, directed search tool 2 (FIG. 1B) simulates a circuit having a single controller, e.g. controller 20 that has eight states S1-S8 (FIG. 1C). Directed search tool 2 identifies controller 20 in the circuit's description (e.g. in file 1A) in response to a directive in file 1C, for example, the directive
$0In_init_search_group(“controller20_state_var”)
which identifies “controller20_state_var” as a state variable. As there is only controller 20 in the circuit-under-verification, in the following description the same eight states S1-S8 are also used to identify the state of the simulation.
Controller 20 has a reset state S1 that is the state of simulation at time T1 (FIG. 1D) in response to reset at time T0. The simulation transitions from state S1 to state S2 at time T2, for example in response to a test vector (e.g. in file 1B) provided by the user. Alternatively, a user can simply change the state of simulation, i.e. overwrite state S1 with state S2. Thereafter, directed search tool 2 saves (in step 12) the current state S2, and simulates (in step 3) the circuit (e.g. described in file 1A) using a test vector V0 (e.g. in file 1B). In response to the test vector V0, the simulation transitions from state S2 to state S3 at time T3, and automatically to state S4 after a delay, e.g. at time T4 (FIG. 1D).
Thereafter, directed search tool 2 performs a step 4 (FIG. 1B) that includes substeps 14A-14C, in this particular implementation. In substep 14A, directed search tool 2 determines a measure of the functional verification completed in prior steps. For example, directed search tool 2 determines that states S1-S4 (shown hatched in FIG. 1C) have been simulated in prior steps. In substep 14B, directed search tool 2 uses the measure of functional verification (e.g. the simulated states S1-S4) to identify the next states that can be reached from the current state (e.g. state S2) but have not been simulated in prior steps. In this particular example, directed search tool 2 enumerates all possible states S1-S8 and then determines that the group of next states includes non-simulated states S5-S8 (FIG. 1C). Next, in the same substep 14B, directed search tool 2 applies a predetermined rule and identifies one or more test vectors required to transition from the current state S2 to one or more of next states S5-S8 (see FIG. 1C). In this particular example, directed search tool 2 finds (e.g. by checking the effect of all valid input values on the circuit in the current state) a first test vector V1 (see FIG. 1D) required to transition from state S2 to state S5, and a second test vector V2 required to transition from state S2 to state S7. Thereafter, in substep 14D, directed search tool 2 sets the simulation at time T5 (FIG. 1D) to the current state S2 that was saved in step 12, e.g. writes the value representing S2 into storage elements that hold the state of simulation (as illustrated by a dashed arrow 19 in FIG. 1C).
Then, directed search tool 2 simulates (see step 1 in FIG. 1B) the circuit using test vector V1 that was identified in step 14 (FIG. 1B). Next, directed search tool 2 checks (see step 16) whether all of test vectors V1 and V2 (identified in step 4) have been used, and if not returns to step 4 (i.e. to substep 14C), and uses the remaining test vector V2 at time T8 (FIG. 1D). If all of test vectors V1 and V2 have been used (e.g. at time T10), and all state transitions have been simulated, directed search tool 2 stops the simulation (see step 17 in FIG. 1B).
Directed search tool 2 simulates behavior of controller 20 (as identified in file 1C) in states S5 and S7 that would otherwise not have been simulated by use of test vector V0 (in file 1B). Specifically, when controller 20 reaches state S4, it can proceed only to states S6 and S8. Controller 20 transitions to states S5 and S7 only from state S2, and cannot reach S5 and S7 from S4, unless restored as described herein.
Therefore, directed search tool 2 finds and exercises difficult-to-reach behaviors, because step 4 finds unvisted states from a “known good state” (i.e. a state that has already been simulated, e.g. current state S2). Such use of a known good state complements existing verification methodologies, because circuit designers find and fix functional errors found in response to typical stimuli that are provided in the test vectors (e.g. in file 1B in FIG. 1A).
When all state transitions have not been exercised in step 17, directed search tool 2 saves (see step 18) one of the next states as the current state, and thereafter returns to step 4 (i.e. to substep 14A) (described above). The remaining next states are saved and used as current state in future applications of step 14B. In this manner, directed search tool 2 attempts to exercise all state transitions, while using the measure of verification to minimize repetition of simulations that have already been performed. Directed search tool 2 also minimizes the repetition of previously performed simulations by simply automatically restoring the simulation to a non-reset state (as illustrated in step 4). In the above-described example of controller 20, use of the verification measure eliminates states S3 and S4 (FIG. 1C) from simulation after time T5 (FIG. 1D), while restoration to state S2 eliminates repetitive simulation of state S1 and any number of additional states that may exist between states S1 and S2. Such elimination of the repetitive simulation performed by the prior art methods (e.g. by resetting the simulation to reset state S1 for each simulation) provides significant advantages in the form of increased speed and efficacy in finding functional defects in the circuit-under-verification.
Although simulation of a single controller (e.g. controller 20) has been described above, a circuit-under-verification (e.g. as described in file 1A) can include a number of such controllers ( e.g. controllers 21 and 22 illustrated in FIGS. 2A and 2B). In such a case, directed search tool 2 illustrated in FIG. 1B can be used multiple times to exercise each of such controllers individually. However, functional defects that are likely to result from unusual interactions between such controllers cause, for example, synchronization errors, resource conflicts, and “one-cycle-off” problems that may not be found by such simulation of individual controllers.
Therefore, in another embodiment, directed search tool 2 implements, in step 4, substeps 24-26 (see FIG. 2D) that searches for such functional defects. Substep 24 counts the simultaneous occurrences of pairs of state transitions, wherein each pair consists of a state transition of each of the two controllers. In a circuit-under- verification having controllers 21 and 22, directed search tool 2 enumerates all possible next states of controllers 21 and 22, and the corresponding pairs of state transitions. In the above-described example, the current states of controllers 21 and 22 are respectively states A and D as illustrated by a paired state AD (see “paired” controller 23 in FIG. 2C) that is obtained by pairing states A and D of controllers 21 and 22. The next states of controllers 21 and 22 are B and E respectively that are reached by respective transitions 21T and 22T (FIGS. 2A and 2B), as illustrated by paired transition 23T (FIG. 2C).
Thereafter, in substep 25, directed search tool 2 applies a predetermined rule, using as input the count of step 24 to identify a test vector for simulation. In the above-described paired controller 23 (FIG. 2C), if states AD, BE and BD have already been simulated (as illustrated by hatching in FIG. 2C), directed search tool 2 identifies (in step 25) a test vector for transitioning to state CD in response to the test vector 23W. Next, directed search tool 2 automatically restores the simulation to the current state BE. Step 25 is illustrated by the function “zi_dpli_poke” in module sd, at lines 2840 to 3156 of microfiche Appendix 41.
In one particular implementation, directed search tool 2 implements substep 24 by performing actions 31-35 (FIG. 2E). Specifically, directed search tool 2 reads the current state of the circuit-under-verification from the simulator (as illustrated by action 31). Action 31 is illustrated by the function “zi_dpli_peek” in module sd, at lines 3272 to 3327 of microfiche Appendix 41. In this particular action, the signal in each storage element (e.g. registers 61-65 in FIG. 2H) of the circuit is read, and all the signals together form the state of the circuit. Next, directed search tool 2 extracts from the current state of the circuit-under-verification, the state of each controller (as illustrated by action 32). Action 32 is illustrated by the function “zi_fsmdb_extract_state” in module fsmdb, at lines 3327 to 3351 of microfiche Appendix 23. Thereafter, if any controller state is found to be simulated for the first time, directed search tool 2 enumerates all possible states that can be reached from that newly simulated state, and also enumerates all related state transitions (as illustrated in action 34). Action 34 is illustrated by the function “zi_ienum_arcs” in module satsetup, at lines 2087 to 2137 of microfiche Appendix 40.
Next, directed search tool 2 composes a state transition pair for the most recently performed simulation step, and increments a count of the state transition pair (as illustrated in action 35). Action 35 is illustrated by the function “zi_fsmdb_srchgrp_update” in module fsmdb, at lines 5122 to 5208 of microfiche Appendix 23. If the controller state extracted in action 32 was previously simulated, directed search tool 2 skips performing action 34 and directly performs action 35 (described above).
In the above-described pair controller 23, when state BE is first simulated, the previous state being state AD, the state of the circuit is retrieved from the simulator by step 31. Thereafter, step 32 extracts the state of each of the user defined controllers (e.g. in file 1C), finding controller 21 to be in state B and controller 22 to be in state E respectively. Since this is the first time that the states B and E respectively have been simulated, therefore step 34 is applied to both controllers. Hence, controller 21 is enumerated to find all the next states from state B, namely B and C, and controller 22 is enumerated to find all the next states from state E, namely D. Step 34 is performed in preparation for step 42 (FIG. 2F). Thereafter, step 35 composes the transition pair that was covered, in this example, from state AD to state BE, and increments a count indicating the number of times the transition AD to BE has been covered in simulation.
During the implementation of substep 25 (FIG. 2D), directed search tool 2 performs actions 41-45 (FIG. 2F). Specifically, directed search tool 2 automatically scans (in action 41) all states that have been simulated. Action 41 is illustrated by the function “zi_score_state” in module srch_ctrl, at lines 1081 to 1744 of microfiche Appendix 45. Thereafter, directed search tool 2 examines the verification measures (as discussed above in reference to substep 24) for all state transitions that start from the current state. Next, directed search tool 2 checks whether any of the state transitions has not yet been performed during the simulation (as illustrated by action 43). If so, directed search tool 2 presents the current state and all state transitions that have not been performed to a function 50 (FIG. 2G) for identification of test vectors. Action 43 uses functions “zi_fsmdb_srchgrp_lookup” in module fsmdb, at lines 5450 to 5544 of microfiche Appendix 23, and function “zi_fsmdb_ifsm_lookup_state” in module fsmdb, at lines 3363 to 3399 of microfiche Appendix 23. Action 43 is illustrated by function “zi_candidate_new_arc” in module srch_ctrl, at lines 1800 to 1860 of microfiche Appendix 45.
Function 50 performs steps 51-59 to identify test vectors that exercise one or more of the not-yet-performed state transitions. Specifically, in step 51, function 50 starts executing, and performs any necessary initialization. An example of the initialization task is illustrated by the function “zi_sat_setup” in module satsetup, at lines 3713 to 3778 of microfiche Appendix 40. Thereafter, in step 52, function 50 sets goals to make registers (hereinafter “state registers”) of the circuit-under-verification take values which will result in performance of a not-yet-performed state transition. Step 52 is illustrated by the function “zi_sat_set_goals” in module sat, at lines 1915 to 1972 of microfiche Appendix 39. Next, in step 53, function 50 takes a goal, and traverses the circuit backwards from an input terminal (e.g., for example from the “Q” terminal of a flip-flop 65 in a circuit 60 (FIG. 2H). Step 53 is illustrated by the function “zi_sat_backtrace” in module sat, at lines 1590 to 1625 of microfiche Appendix 39.
In circuit 60, all circuit elements reached by the backward traversal are illustrated in FIG. 2H within a space called “cone of logic”. The cone of logic is delimited by lines 65A and 65B that intersect at the “Q” terminal of flip-flop 65, and fan out backward to include storage elements, e.g. registers 61-64, groups of logic elements 66 and 67, and input terminals 68 and 69. The cone of logic is transitive, i.e. the cone of logic of flip-flop 65 includes the fan-in of flip-flop 63 because flip-flop 63 fans-out to the “Q” terminal of flip-flop 65. Each level of flip-flops in the cone of logic is considered to be one cycle of logic. The cone of logic extends backwards for some number of cycles of logic and is terminated by a maximum cycle number that is set by a budget measure, either by the user or automatically. The cone of logic is established by step 51 for each of the state registers for which a goal exists. Thereafter, all register values outside the cone of logic are considered constants. Registers inside the cone of logic are also considered constants if there are no input terminals that can change values to affect the value of the register.
Thereafter, in step 54, function 50 checks if a change in a signal at an input terminal (e.g. one of terminals 68 and 69) is sufficient to satisfy the goal. If so, function 50 selects test vectors necessary to set the input terminal to the required signal value (as illustrated in step 55), and goes to step 58 to check if more goals need to be satisfied.
In step 54, if the goal cannot be satisfied, function 50 checks if a signal in any one of the registers 61-64 in the cone of logic can be changed to satisfy the goal (e.g. if the values are symbols of the type used in symbolic simulation). If none of the values in registers 61-64 can be changed (e.g. because the values are constants), function 50 goes to step 59 to check if any more state transitions remain not-yet-performed (as illustrated by step 59). If so, function 50 returns to step 52 (described above). Alternatively, if in step 52 if a register does not have a constant value, function 50 sets the goal to change the register to the necessary value required to satisfy the current goal (as illustrated in step 57) and thereafter returns to step 54 if more goals remain to be satisfied. The steps 54-57 are illustrated by the function “zi_sat_satisfy” in module sat, at lines 1985 to 2064 of microfiche Appendix 39.
In one embodiment, function 50 is assisted by performing a symbolic simulation of the circuit in parallel with the normal circuit simulation in steps 3 and 5 of FIG. 1A. A symbolic simulator is illustrated by the function “zi_syms_run” in module ss, at lines 2416 to 2536 of microfiche Appendix 46.
Thereafter, during backward traversal through the cone of logic, when function 50 reaches a storage element containing a symbol, function 50 simply picks an appropriate value in the range represented by the symbol that satisfies the goal. Therefore, symbolic simulation eliminates the need to traverse backward all the way to the input terminal that originated the range of values at the storage element.
Although the controllers mentioned heretofore refer to controllers in the circuit, additional controller descriptions, called “protocol controllers”, can be used to represent the allowable test vectors that can be applied to the input terminals of the circuit. In such a case, the verification measure in the above description can be a count of the simultaneous performance of a state transition of a controller of the circuit and a state transition of a protocol controller.
Therefore, in another embodiment, directed search tool 2 implements in step 32 (FIG. 2E), extraction of the both the state of a controller of the circuit and the state of a protocol controller. In one implementation, a description of a protocol controller is combined with the circuit description and used as input for directed search. In this case, step 32 extracts the protocol controller state in the same manner as it extracts the circuit state.
In another embodiment, a computer 70 is programmed with a search preparation tool 71 that automatically scans (as illustrated by step 71A) descriptions of circuitry (e.g. in file 1A) to generate a graph, and thereafter automatically traverses (see step 71B) the graph to generate a description that is refined, e.g. by eliminating unnecessary circuitry, such as a declared register that is the destination of an assignment statement in a Verilog “always” statement. Specifically, in step 71A (FIG. 3B), search preparation tool 71 automatically creates a parse tree (see substep 76) and thereafter traverses (see substep 77) the parse tree to create the graph. Substeps 76 and 77 are similar or identical to substeps 210 and 220 described in reference to FIG. 2 in the U.S. patent application Ser. No. 08/955,329 incorporated by reference above. Therefore, search preparation tool 71 generates a description (e.g. in file 73A in FIG. 3A) that describes circuit elements remaining in the graph resulting from flattening and load refinement (described in reference to actions 408 and 409 in FIG. 4A in the U.S. patent application Ser. No. 08/955,329 incorporated by reference above). One implementation of this embodiment is illustrated in function “zi_nl_create_graph” in module nl, at lines 1691 to 1771 of microfiche Appendix 33 and in function “zi_elab_design” in module elab, at lines 4633 to 4702 of microfiche Appendix 18.
In this particular embodiment, search preparation tool 71 also describes (e.g. in file 73A) one or more circuits (also called “restoration circuits”) that may be required (depending on the circuit-under-verification) for restoring signals (also called “asynchronous signals”) that occur in the clock cycle immediately following the current state, and that may not occur after restoration of simulation to the current state. During simulation, directed search tool 72 saves the state at each clock cycle, and uses the restoration circuits and the state (hereinafter “previous state”) that immediately precedes the current state to recreate such asynchronous signals after state restoration. One implementation of such a directed search tool 72 is illustrated by function “zi_srch_ctrl” in module srch_ctrl, at lines 2024 to 2616 in microfiche Appendix 45.
Therefore, in step 71B (FIG. 3B), search preparation tool 71 automatically examines the graph for instances of an arrangement that can result in an asynchronous signal being used to clock a storage element, or to reset a storage element. For example, search preparation tool 71 automatically traverses the graph to find all instances of an arrangement 86 that includes two storage nodes 86A and 86C, wherein an output terminal D of a first storage node 86A is coupled to a clock terminal C of second node 86C, e.g. through a logic node 86B. In one example, search preparation tool 71 scans the following description of circuit 87 (FIG. 3D) in Verilog provided in file 1A (FIG. 3A):
module asynch_example (clk, Q_p, Q_pp, D_pp);
input clk;
input Q_p;
input Q_pp;
output   D_pp;
reg reg1;
reg reg2;
assign   D_pp =  reg2;
always   @(posedge clk) begin
  reg1 <= Q_p;
end
always   @(posedge reg1) begin
  reg2 <= Q_pp;
end
endmodule;
Circuit 87 (FIG. 3D) is in state S1 (FIG. 1C) at a rising edge in a clock signal CLOCK (e.g. at time T0 in FIG. 3H), and signal INP1 goes active at the Q terminal of storage element REG1 (FIG. 3D) a short time thereafter (e.g. at time T1). Therefore, storage element REG1 drives a signal ASYNC1 active a short time after the next rising edge (e.g. at time T2) in clock signal CLOCK (e.g. at time T3). The rising edge in signal ASYNC1 causes storage element REG2 to take the value of INP2 at time T6. Thereafter, when circuit 87 is restored to state S2 (e.g. at time T9), the signal ASYNC1 does not have a rising edge. Specifically, in the state prior to time T9, ASYNC1 is active and INP2 is inactive. At time T9, state S2 is restored to the simulator, for example using a C language interface to the simulator as illustrated by calls to the function “acc_set_value” in module sd, at lines 3264, 3607 and 3729 in microfiche Appendix 41. The step of restoring causes the values of all signals to take their respective values at time T6 when state S2 was first simulated. Consequently, INP2 becomes active and ASYNC1 remains active which causes REG2 to fail to clock a new value when simulated to state S5 in FIG. 1C because it does not observe a rising edge on ASYNC1.
Specifically, the rising edge in signal ASYNC1 causes storage element REG2 to supply during the transition from state S2 to state S3 (e.g. at time T6 in FIG. 3H) a signal INP2 received at the Q terminal as the output signal OUT1 at the D terminal. However, in the absence of the rising edge in signal ASYNC1 after restoration, storage element REG2 fails to supply (e.g. during the transition from state S2 to state S5) signal INP2 as output signal OUT1. Therefore, in this example, signal OUT1 is low prior to the restoration step at time T9 and remains low at time T13 during simulation after restoration. The reference numerals T9-T16 (FIG. 3H) identify the simulation time after restoring state S2 and correspond to the reference numerals T2-T6 of simulation time after state S2 without restoration.
To recreate an asynchronous signal (e.g. signal ASYNC1), search preparation tool 71 generates a description of a restoration circuit that includes a multiplexer (e.g. multiplexer 88M) that has two input terminals, a control terminal and an output terminal, wherein the output terminal is coupled to the second storage element (e.g. storage element REG2) and a first input terminal is coupled to the first storage element REG1. Each restoration circuit also includes (1) a first storage element (also called “previous value register”, e.g. element 88A) coupled to the second input terminal of multiplexer and (2) a second storage element (also called “asynchronous MUX select register”, e.g. element 88B) coupled to the control terminal of multiplexer.
In the above-described example, during step 71B (FIG. 3A), search preparation tool 71 finds that a storage element REG2 in circuit 87 has a clock terminal that is coupled to storage element REG1 in the above-described arrangement 86 (wherein there is no logic node in circuit 87), as illustrated in function “zi_hout_mark_gcm_asynch_reset” in module hout, at lines 9016 to 9094 in microfiche Appendix 28. On finding such an instance of arrangement 86 in circuit 87, search preparation tool 71 generates the following instructions in Verilog for a restoration circuit 88 (FIG. 3E) that assists in restoration of asynchronous signals in the circuit-under-verification (by directed search tool 72 in step 4; see FIG. 3A).
module asynch_example (clk, Q_p, Q_pp, D_pp);
input clk;
input Q_p;
input Q_pp;
output   D_pp;
reg reg1;
reg reg2;
reg prev_reg1;    // Extra registers and wire
reg asynch_mux_select;
wire asynch_clk;
assign asynch_clk =
asynch_mux_select ? reg1 : prev_reg1;
// Extra MUX
assign D_pp = reg2;
always   @(posedge clk) begin
 reg1   <= Q_p;
end
always @(posedge asynch_clk) begin
// Clock from new wire from MUX
 reg2   <= Q_pp;
end
endmodule;
Thereafter, during the restoration of a state, e.g. state S2 (FIG. 1C), directed search tool 72 performs substeps 81-85 (FIG. 3G) in step 4 (FIG. 3A) using restoration circuits (e.g. circuit 88) generated by search preparation tool 71 to generate at least a majority of the asynchronous signals (all asynchronous signals in one example). Specifically, in substep 81, directed search tool 72 forces the values of a majority of the storage elements (in one example all the storage elements) in the circuit to the values that were held in the current state (e.g. in state S2). Next, in substep 82, directed search tool 72 forces each previous value register to hold the value at the first storage node in the arrangement (e.g. the value at storage node 86A) in the previous state. Specifically, in circuit 87 (FIG. 3E), directed search tool 72 causes previous value register 88A to hold the value in storage element REG1 in state S1, e.g. the value 0. Thereafter, in substep 83, directed search tool 72 forces each asynchronous MUX select register to the value that causes the multiplexer to pass to the clock terminal of the second storage element the signal from the previous value register. Therefore, in the above-described example, directed search tool 72 drives the signal CLOCKS active that in turn causes storage element 88B to drive signal SELECT active (as illustrated at time T10 in FIG. 3H).
Next, in step 84, directed search tool 72 forces the simulation to proceed for a non-zero time period, specifically the simulation time needed for the signal PREV from storage element 88 to go through multiplexer 88M and reach the clock terminal of storage element REG2. The time period can be, for example, one nanosecond of simulation time, even if the delay through multiplexer 88M is zero. Therefore, at time T11 the signal ASYNC2 at the clock terminal of storage element REG2 goes low as illustrated at time T11 in FIG. 3H. Thereafter, directed search tool 72 forces each asynchronous mux select register to the value that causes the multiplexer to pass the signal at the first storage node 86A (FIG. 3A) in state S2. In the above-described example, directed search tool 72 causes storage element 88B to drive the signal SELECT inactive that in turn causes multiplexer 88M to pass the signal of value 1 from storage element REG1 to the clock terminal of storage element REG2. Hence, signal ASYNC2 goes high at the clock terminal of storage element REG2 at time T12. Therefore, storage element REG2 receives, at the clock terminal, a rising edge in the signal at time T12 that in turn causes storage element REG2 to supply as signal OUT2 the signal INP2.
In another embodiment, the directed search tool 2 can be combined with automatically generated checkers as illustrated in FIG. 4. The automatically generated checkers are created by simulation preparation tool 91 from the circuit description by automatic conversion (see step 92A), automatic examination (see step 92B) and automatic generation (see step 92C), as described in the above-referenced U.S. patent application Ser. No. 08/955,329. Thereafter, the checkers (e.g. in files 95A-95M) are simulated with simulation of the circuit (as described in file 73A) by directed search tool 72. During the directed search, the checkers flag known defective behavior.
Appendices 1-58 in the microfiche incorporated by reference above contain software listings and documentation as follows:
Appendix Appendix
Number Name Description
1 arr Data structures and utilities to
implement arrays, used by many other
modules, e.g. fsmdb
2 assertion Handlers for assertions, used by
many other modules, e.g. srch_ctrl
3 attr Data structures and utilities for
recording attributes in the
database, used by dbo
4 avl Data structures and utilities to
implement a balanced tree, used by
srch_ctrl
5 bdo Calculates the binding distance
offset of symbols, used by ss and
sat
6 bm Data structures and utilities to
implement symbol bindings, used by
sat
7 bv Data structures and utilities to
implement bit vectors, used by stmgr
8 chx Creates checker models, called by
dsh
9 cm Creates and analyzes paths carrying
data in the netlist, used by chx
10 conset Data structures and utilities to
implement constraints for symbols,
used by sat
11 const Data structures and utilities for
Verilog constants, used by pt
12 cpli Data structures and utilities for C-
language interface to Verilog,
called from simulator when running
checkers
13 dbo Maintains database of netlist,
protocols and state machine
attributes, used by dsh and sd
14 dcf Data structures and utilities for
search parameter file, used by sd
15 debug Utilities to debug checker synthesis
and search tools, used by many
modules, e.g. srch_ctrl
16 dsesym Data structures and utilities to
implement a symbol table for search,
used by stmgr and sd
17 dsh Command shell for a user to
interface to search preparation tool
18 elab Converts the parse tree into
netlist, called from dsh
19 er Data structures and utilities to
implement Verilog value change dump,
used by seedex and sd
20 eval Data structures and utilities for
evaluating expressions, used by pm
21 expr Data structures and utilities for
creating expressions, used by pt and
nl
22 fda Data structures and utilities to
implement optimized arrays, used by
sat
23 fsmdb Data structures and utilities to
implement search pair arc coverage
database, used by srch_ctrl
24 futil Utilities to manipulate files, used
by hout
25 gcm Extract and write out Verilog model
for search tool, called from dsh
26 gstack Data structures and utilities to
implement growable stack, used by
sat
27 hash Data structures and utilities to
implement hash tables, used by many
modules, e.g. fsmdb
28 hout Writes out checker modules in
Verilog using support routines,
called from dsh
29 hsh Command shell for a user to
interface to the checker synthesis
tool
30 list Data structures and utilities to
implement linked lists, used by many
modules, e.g. srch_ctrl
31 mem Utilities to manage memory
allocation, used by many modules,
e.g. srch_ctrl
32 mesg Utilities to print messages, used by
many modules, e.g. srch_ctrl
33 nl Analyzes the netlist, called from
dsh
34 osd Utilities to print messages, used by
sd
35 osd_nonpli Utilities to print messages, used by
sd
36 pm Data structures and utilities for
protocol analysis and
interpretation, used by srch_ctrl
and seedex
37 pt Data structures and utilities for
building a parse tree, used by nl
and pm
38 random Utilities for generating pseudo-
random numbers, used by srch_ctrl
39 sat Data structures and utilities for
search satisfiability analysis, used
by satsetup
40 satsetup Data structures and utilities to
prepare for search satisfiability
analysis, used by srch_ctrl
41 sd Utilities to interface search tool
to C-language interface of Verilog,
called by the simulator to setup
parameters, start the search tool
and read & set the state of the
circuit in simulation
42 seedex Data structures and utilities for
seed trace reading and
interpretation used by srch_ctrl
43 slice Data structures and utilities to
implement bit-slices, used by chx
44 snl Data structures and utilities to
implement netlist used for search,
called from dsh and used by satsetup
and sat
45 srch_ctrl Data structures and utilities to
control search, used by sd
46 ss Data structures and utilities for
symbolic simulation, used by
srch_ctrl
47 stack Data structures and utilities to
implement stacks, used by srch_ctrl
48 stmgr Data structures and utilities to
manage states in search, used by
srch_ctrl, fsmdb and sat
49 symb Symbol table for Verilog parser,
used by pt
50 ubv Utilities to implement faster bit
vector operations, used by stmgr and
seedex
51 ufsm Unroll FSM logic for analysis,
called by dsh
52 value Data structures and utilities to
implement 16-value constants, used
by ss and sat
53 version Utilities to track the version of
the checker synthesis and search
tools, used by dsh
54 vout Support routines for writing
Verilog, used by hout
55 vp Scans Verilog text and creates a
parse tree, called from dsh
56 vpgen Scans Verilog text and creates a
parse tree for Verilog search model,
called from dsh
57 vtype Data structures and utilities for
Verilog operations and types, used
by vp
58 zdf Utilities to save and restore
netlist and attributes to disk, used
by dbo
Numerous modifications and adaptations of the embodiments described herein will be apparent to a person of skill in the art of electronic design automation (EDA) in view of the disclosure (including the software and documentation in microfiche Appendices 1-58 incorporated by reference above, and the U.S. patent application Ser. No. 08/955,329 incorporated by reference above). Other embodiments of a method in accordance with the invention include one or more of the following steps: automatically restoring a current state of simulation by applying a test vector that causes the simulation to return to the current state after one or more simulation cycles without entering a reset state; retaining in computer memory and using (for example, in step 41 of FIG. 2F) a subset of the states simulated; enumerating all possible next states of a current state (for example, in step 18 of FIG. 1B); using instructions in the “C” programming language to simulate the functional behavior of the circuit; using a “C” programming language description of a protocol controller; using a predetermined rule to select test vectors which uses as input the state of a protocol controller; using a predetermined rule which selects test vectors randomly; using a predetermined rule for selecting test vectors which selects all test vectors applicable to the current state; using more than one predetermined rule to select test vectors; using user-specified checkers in combination with directed search tool 2; using end-to-end tests in combination with directed search tool 2; using a golden model in combination with directed search tool 2; using instructions describing checkers as part of a verification quality-assurance test suite or regression test suite for a circuit description; using checkers in conjunction with a pre-existing testbench to find functional defects in a description of a circuit; using instructions describing checkers for characterizing the performance of a description of a circuit; and using instructions describing checkers to provide a measure of the functional testing of a description of a circuit. Therefore, many such variations of the embodiments described herein are encompassed by the attached claims.

Claims (18)

1. A method for simulating a circuit description, the method comprising:
determining a current state;
performing a first simulation for finding defects of the circuit description;
restoring the first simulation to the current state after the first simulation;
determining one or more next states that are reachable from the current state; and
performing a second simulation for finding defects of the circuit description after restoring said first simulation to the current state using the one or more next states; and
flagging errors for defects that are found during the first or second simulation.
2. The method of claim 1, wherein restoring the first simulation to the current state comprises restoring the first simulation to the current state without entering a reset state.
3. The method of claim 1, wherein determining the one or more next states comprises:
determining a group of possible states that are reachable from the current state; and
selecting the one or more next states from the group of possible states, the one or more next states not being simulated in the first simulation.
4. The method of claim 1, further comprising:
selecting one of the one or more next states as a new current state; and
restoring the second simulation to the new current state after the second simulation;
determining a second set of one or more next states that are reachable from the new current state; and
performing a third simulation of the circuit description after restoring the second simulation to the new current state using the second set of one or more next states.
5. The method of claim 1, further comprising:
determining a first test vector for the first simulation;
using the first test vector in performing the first simulation;
determining a second test vector for the second simulation; and
using the second test vector in the second simulation.
6. The method of claim 1, wherein flagging errors for defects that occur during the first or second simulation comprises generating one or more error messages for the errors flagged.
7. An apparatus configured to simulate a circuit description, the apparatus comprising:
one or more processors; and
a memory containing instructions that, when executed by the one or more processors, cause the one or more processors to perform a set of steps comprising:
determining a current state;
performing a first simulation for finding defects of the circuit description;
restoring the first simulation to the current state after the first simulation;
determining one or more next states that are reachable from the current state; and
performing a second simulation for finding defects of the circuit description after restoring said first simulation to the current state using the one or more next states; and
flagging errors for defects that are found during the first or second simulation.
8. The apparatus of claim 7, wherein the instructions cause the one or more processors to perform a further step comprising:
restoring the first simulation to the current state without entering a reset state.
9. The apparatus of claim 7, wherein the instructions cause the one or more processors to perform further steps comprising:
determining a group of possible states that are reachable from the current state; and
selecting the one or more next states from the group of possible states, the one or more next states not being simulated in the first simulation.
10. The apparatus of claim 7, wherein the instructions cause the one or more processors to perform further steps comprising:
selecting one of the one or more next states as a new current state; and
restoring the second simulation to the new current state after the second simulation;
determining a second set of one or more next states that are reachable from the new current state; and
performing a third simulation of the circuit description after restoring the second simulation to the new current state using the second set of one or more next states.
11. The apparatus of claim 7, wherein the instructions cause the one or more processors to perform further steps comprising:
determining a first test vector for the first simulation;
using the first test vector in performing the first simulation;
determining a second test vector for the second simulation; and
using the second test vector in the second simulation.
12. The apparatus of claim 7, wherein the instructions cause the one or more processors to perform a further step comprising:
generating one or more error messages for errors flagged for defects that occur during the first or second simulation.
13. An information storage medium containing instructions that, when executed by one or more processors, cause the one or more processors to perform a set of steps comprising:
determining a current state;
performing a first simulation for finding defects of the circuit description;
restoring the first simulation to the current state after the first simulation;
determining one or more next states that are reachable from the current state; and
performing a second simulation for finding defects of the circuit description after restoring said first simulation to the current state using the one or more next states; and
flagging errors for defects that are found during the first or second simulation.
14. The information storage medium of claim 13, wherein the instructions cause the one or more processors to perform a further step comprising:
restoring the first simulation to the current state without entering a reset state.
15. The information storage medium of claim 13, wherein the instructions cause the one or more processors to perform further steps comprising:
determining a group of possible states that are reachable from the current state; and
selecting the one or more next states from the group of possible states, the one or more next states not being simulated in the first simulation.
16. The information storage medium of claim 13, wherein the instructions cause the one or more processors to perform further steps comprising:
selecting one of the one or more next states as a new current state; and
restoring the second simulation to the new current state after the second simulation;
determining a second set of one or more next states that are reachable from the new current state; and
performing a third simulation of the circuit description after restoring the second simulation to the new current state using the second set of one or more next states.
17. The information storage medium of claim 13, wherein the instructions cause the one or more processors to perform further steps comprising:
determining a first test vector for the first simulation;
using the first test vector in performing the first simulation;
determining a second test vector for the second simulation; and
using the second test vector in the second simulation.
18. The information storage medium of claim 13, wherein the instructions cause the one or more processors to perform a further step comprising:
generating one or more error messages for errors flagged for defects that occur during the first or second simulation.
US11/035,275 1997-10-20 2005-01-12 Method for automatically searching for functional defects in a description of a circuit Expired - Fee Related US7478028B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/035,275 US7478028B2 (en) 1997-10-20 2005-01-12 Method for automatically searching for functional defects in a description of a circuit

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08/954,765 US6292765B1 (en) 1997-10-20 1997-10-20 Method for automatically searching for functional defects in a description of a circuit
US09/849,005 US6885983B1 (en) 1997-10-20 2001-05-04 Method for automatically searching for functional defects in a description of a circuit
US11/035,275 US7478028B2 (en) 1997-10-20 2005-01-12 Method for automatically searching for functional defects in a description of a circuit

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/849,005 Continuation US6885983B1 (en) 1997-10-20 2001-05-04 Method for automatically searching for functional defects in a description of a circuit

Publications (2)

Publication Number Publication Date
US20050131665A1 US20050131665A1 (en) 2005-06-16
US7478028B2 true US7478028B2 (en) 2009-01-13

Family

ID=25495898

Family Applications (3)

Application Number Title Priority Date Filing Date
US08/954,765 Expired - Lifetime US6292765B1 (en) 1997-10-20 1997-10-20 Method for automatically searching for functional defects in a description of a circuit
US09/849,005 Expired - Lifetime US6885983B1 (en) 1997-10-20 2001-05-04 Method for automatically searching for functional defects in a description of a circuit
US11/035,275 Expired - Fee Related US7478028B2 (en) 1997-10-20 2005-01-12 Method for automatically searching for functional defects in a description of a circuit

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US08/954,765 Expired - Lifetime US6292765B1 (en) 1997-10-20 1997-10-20 Method for automatically searching for functional defects in a description of a circuit
US09/849,005 Expired - Lifetime US6885983B1 (en) 1997-10-20 2001-05-04 Method for automatically searching for functional defects in a description of a circuit

Country Status (1)

Country Link
US (3) US6292765B1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070208548A1 (en) * 2006-03-03 2007-09-06 Solido Design Automation Inc. Modeling of systems using canonical form functions and symbolic regression
US20080127009A1 (en) * 2006-11-03 2008-05-29 Andreas Veneris Method, system and computer program for automated hardware design debugging
US20090037858A1 (en) * 2007-07-31 2009-02-05 Shashidhar Anil Thakur Method For Automatic Maximization of Coverage in Constrained Stimulus Driven Simulation
US20090171647A1 (en) * 2007-12-27 2009-07-02 Phanindra Mannava Interconnect architectural state coverage measurement methodology
US20090216513A1 (en) * 2008-02-27 2009-08-27 Dmitry Pidan Design verification using directives having local variables
US7747971B1 (en) * 2007-06-30 2010-06-29 Cadence Design Systems, Inc. State retention for formal verification
US20110029945A1 (en) * 2009-07-31 2011-02-03 Elliott B Alexander NetList Maintenance in a Circuit Diagram
US20110071809A1 (en) * 2009-09-23 2011-03-24 International Business Machines Corporation Model generation based on a constraint and an initial model
US20110107293A1 (en) * 2009-10-29 2011-05-05 Synopsys, Inc. Simulation-based design state snapshotting in electronic design automation
US8185850B1 (en) * 2010-03-23 2012-05-22 Xilinx, Inc. Method of implementing a circuit design using control and data path information
US8869080B2 (en) 2012-09-26 2014-10-21 Apple Inc. Automatically identifying resettable flops for digital designs
US9734263B2 (en) * 2012-12-20 2017-08-15 Intel Corporation Method and apparatus for efficient pre-silicon debug
US10823782B2 (en) 2017-09-25 2020-11-03 International Business Machines Corporation Ensuring completeness of interface signal checking in functional verification

Families Citing this family (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6292765B1 (en) * 1997-10-20 2001-09-18 O-In Design Automation Method for automatically searching for functional defects in a description of a circuit
US6675359B2 (en) * 1998-08-26 2004-01-06 Michael E.J. Gilford Recognition of a state machine in high-level integrated circuit description language code
US6510405B1 (en) * 1998-12-22 2003-01-21 Unisys Corporation Method and apparatus for selectively displaying signal values generated by a logic simulator
US6581191B1 (en) * 1999-11-30 2003-06-17 Synplicity, Inc. Hardware debugging in a hardware description language
US7065481B2 (en) * 1999-11-30 2006-06-20 Synplicity, Inc. Method and system for debugging an electronic system using instrumentation circuitry and a logic analyzer
US6931572B1 (en) 1999-11-30 2005-08-16 Synplicity, Inc. Design instrumentation circuitry
US7240303B1 (en) 1999-11-30 2007-07-03 Synplicity, Inc. Hardware/software co-debugging in a hardware description language
US7072818B1 (en) 1999-11-30 2006-07-04 Synplicity, Inc. Method and system for debugging an electronic system
US6904397B1 (en) * 2000-02-22 2005-06-07 Xilinx, Inc. System and method for assisting in the development and integration of reusable circuit designs
JP2002049652A (en) * 2000-08-03 2002-02-15 Hiroshi Yasuda Digital circuit design method, its compiler and simulator
US7246055B1 (en) * 2000-08-28 2007-07-17 Cadence Design Systems, Inc. Open system for simulation engines to communicate across multiple sites using a portal methodology
US6751752B1 (en) * 2000-09-01 2004-06-15 Intel Corporation Checking events generated by a device
US6751759B1 (en) * 2000-11-03 2004-06-15 Freescale Semiconductor, Inc. Method and apparatus for pipeline hazard detection
US6772370B1 (en) * 2000-11-03 2004-08-03 Freescale Semiconductor, Inc. Method and apparatus for generation of pipeline hazard test sequences
US7222315B2 (en) 2000-11-28 2007-05-22 Synplicity, Inc. Hardware-based HDL code coverage and design analysis
US7165231B2 (en) * 2000-12-18 2007-01-16 Yardstick Research, Llc Method and system for incremental behavioral validation of digital design expressed in hardware description language
US6665848B2 (en) * 2001-01-12 2003-12-16 International Business Machines Corporation Time-memory tradeoff control in counterexample production
DE10144455A1 (en) * 2001-09-10 2003-04-03 Infineon Technologies Ag Method for checking an image of an electrical circuit
US20030188275A1 (en) * 2002-03-27 2003-10-02 Meares Lawrence G. System and method of preventing the simulation of a circuit if a change to the circuit topology is detected
US7827510B1 (en) 2002-06-07 2010-11-02 Synopsys, Inc. Enhanced hardware debugging with embedded FPGAS in a hardware description language
US6848088B1 (en) 2002-06-17 2005-01-25 Mentor Graphics Corporation Measure of analysis performed in property checking
JP2004086838A (en) * 2002-07-04 2004-03-18 Toshiba Corp Verification system and verification method of system
US8224636B2 (en) 2002-12-17 2012-07-17 Cadence Design Systems, Inc. Method and system for implementing parallel execution in a computing system and in a circuit simulator
US20070299648A1 (en) * 2003-01-10 2007-12-27 Levitt Jeremy R Reuse of learned information to simplify functional verification of a digital circuit
US7454324B1 (en) 2003-01-10 2008-11-18 James Andrew Garrard Seawright Selection of initial states for formal verification
US7885792B2 (en) * 2003-04-15 2011-02-08 The Mathworks, Inc. Programming Environment
US7500228B2 (en) * 2003-07-18 2009-03-03 Agere Systems Inc. System and method for automatically generating a hierarchical register consolidation structure
US7194658B2 (en) * 2003-07-24 2007-03-20 Sonics, Inc. Various methods and apparatuses for interfacing of a protocol monitor to protocol checkers and functional checkers
JP4183182B2 (en) * 2003-08-22 2008-11-19 株式会社リコー Design support apparatus and design support method
US7219315B1 (en) * 2003-09-22 2007-05-15 Tenison Technology Eda Limited Comparison of semiconductor circuitry simulations
US7231615B2 (en) * 2003-12-08 2007-06-12 Cadence Design Systems, Inc. Methods and apparatus for transforming sequential logic designs into equivalent combinational logic
DE102004010783A1 (en) * 2004-03-05 2005-09-29 Infineon Technologies Ag Method and circuit arrangement for testing electrical components
US7640151B2 (en) * 2004-03-30 2009-12-29 Broadcom Corporation Asynchronous clock domain crossing jitter randomiser
US7213122B2 (en) * 2004-04-02 2007-05-01 International Business Machines Corporation Controlling the generation and selection of addresses to be used in a verification environment
US7360186B2 (en) * 2004-05-21 2008-04-15 Fujitsu Limited Invariant checking
US20060047483A1 (en) * 2004-08-31 2006-03-02 Analog Devices, Inc. System and method for automated verification of performance and budget goals in a process
US20060095824A1 (en) * 2004-11-01 2006-05-04 Mcgrath Michael S Determining circuit behavior
US7367001B2 (en) * 2004-12-02 2008-04-29 International Business Machines Corporation Method, system and computer program product for verification of digital designs using case-splitting via constrained internal signals
US7444271B2 (en) * 2004-12-03 2008-10-28 Arm Limited Scoring mechanism for automatically generated test programs
US7373550B2 (en) * 2005-02-03 2008-05-13 Arm Limited Generation of a computer program to test for correct operation of a data processing apparatus
US8036873B2 (en) 2005-02-28 2011-10-11 Synopsys, Inc. Efficient clock models and their use in simulation
US8205186B1 (en) 2005-04-11 2012-06-19 Synopsys, Inc. Incremental modification of instrumentation logic
US7970594B2 (en) * 2005-06-30 2011-06-28 The Mathworks, Inc. System and method for using model analysis to generate directed test vectors
US20070074210A1 (en) * 2005-09-23 2007-03-29 Microsoft Corporation Optimal stateless search
JP2007102475A (en) * 2005-10-04 2007-04-19 Dainippon Screen Mfg Co Ltd Test case extraction device, test case extraction program, and test case extraction method for software system
US7428712B1 (en) * 2005-11-18 2008-09-23 Cadence Design Systems, Inc. Design optimization using approximate reachability analysis
US7644396B2 (en) * 2005-11-29 2010-01-05 Microsoft Corporation Optimal program execution replay and breakpoints
US20070282964A1 (en) * 2006-06-06 2007-12-06 International Business Machines Corporation Method and apparatus for processing remote shell commands
US8230263B2 (en) * 2007-09-19 2012-07-24 Lsi Corporation Automated specification based functional test generation infrastructure
US8327191B2 (en) * 2007-10-19 2012-12-04 International Business Machines Corporation Automatically populating symptom databases for software applications
US8943451B2 (en) * 2010-06-23 2015-01-27 Mentor Graphics Corporation Hierarchical finite state machine generation for power state behavior in an electronic design
GB2512888A (en) 2013-04-10 2014-10-15 Ibm Verification assistance method in particular for the design of digital circuits
JP5963316B2 (en) * 2014-02-20 2016-08-03 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Generating apparatus, generating method, and program
EP3067129A1 (en) * 2015-03-09 2016-09-14 Autotech Engineering, A.I.E. Press systems and methods
US10502782B2 (en) 2017-11-10 2019-12-10 International Business Machines Corporation Synthesis for random testability using unreachable states in integrated circuits
KR20200131056A (en) * 2019-05-13 2020-11-23 삼성전자주식회사 Method and apparatus for system verification based on reinforcement learning

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5202889A (en) 1990-04-18 1993-04-13 International Business Machines Corporation Dynamic process for the generation of biased pseudo-random test patterns for the functional verification of hardware designs
US5479414A (en) 1990-12-26 1995-12-26 International Business Machines Corporation Look ahead pattern generation and simulation including support for parallel fault simulation in LSSD/VLSI logic circuit testing
US5539652A (en) 1995-02-07 1996-07-23 Hewlett-Packard Company Method for manufacturing test simulation in electronic circuit design
US5555270A (en) 1995-03-13 1996-09-10 Motorola Inc. Method and apparatus for constructing unique input/output sequence (UIO) sets utilizing transition distinctness measurements
US5600787A (en) 1994-05-31 1997-02-04 Motorola, Inc. Method and data processing system for verifying circuit test vectors
US5623499A (en) 1994-06-27 1997-04-22 Lucent Technologies Inc. Method and apparatus for generating conformance test data sequences
US5630051A (en) 1995-03-06 1997-05-13 Motorola Inc. Method and apparatus for merging hierarchical test subsequence and finite state machine (FSM) model graphs
US5638381A (en) 1995-07-21 1997-06-10 Motorola, Inc. Apparatus and method for deriving correspondence between storage elements of a first circuit model and storage elements of a second circuit model
US5654657A (en) 1995-08-01 1997-08-05 Schlumberger Technologies Inc. Accurate alignment of clocks in mixed-signal tester
US5661661A (en) 1990-12-21 1997-08-26 Synopsys, Inc. Method for processing a hardware independent user description to generate logic circuit elements including flip-flops, latches, and three-state buffers and combinations thereof
US5680332A (en) 1995-10-30 1997-10-21 Motorola, Inc. Measurement of digital circuit simulation test coverage utilizing BDDs and state bins
US5729554A (en) 1996-10-01 1998-03-17 Hewlett-Packard Co. Speculative execution of test patterns in a random test generator
US5862149A (en) 1995-08-29 1999-01-19 Unisys Corporation Method of partitioning logic designs for automatic test pattern generation based on logical registers
US6175946B1 (en) 1997-10-20 2001-01-16 O-In Design Automation Method for automatically generating checkers for finding functional defects in a description of a circuit
US6292765B1 (en) 1997-10-20 2001-09-18 O-In Design Automation Method for automatically searching for functional defects in a description of a circuit

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5202889A (en) 1990-04-18 1993-04-13 International Business Machines Corporation Dynamic process for the generation of biased pseudo-random test patterns for the functional verification of hardware designs
US5661661A (en) 1990-12-21 1997-08-26 Synopsys, Inc. Method for processing a hardware independent user description to generate logic circuit elements including flip-flops, latches, and three-state buffers and combinations thereof
US5479414A (en) 1990-12-26 1995-12-26 International Business Machines Corporation Look ahead pattern generation and simulation including support for parallel fault simulation in LSSD/VLSI logic circuit testing
US5600787A (en) 1994-05-31 1997-02-04 Motorola, Inc. Method and data processing system for verifying circuit test vectors
US5623499A (en) 1994-06-27 1997-04-22 Lucent Technologies Inc. Method and apparatus for generating conformance test data sequences
US5539652A (en) 1995-02-07 1996-07-23 Hewlett-Packard Company Method for manufacturing test simulation in electronic circuit design
US5630051A (en) 1995-03-06 1997-05-13 Motorola Inc. Method and apparatus for merging hierarchical test subsequence and finite state machine (FSM) model graphs
US5555270A (en) 1995-03-13 1996-09-10 Motorola Inc. Method and apparatus for constructing unique input/output sequence (UIO) sets utilizing transition distinctness measurements
US5638381A (en) 1995-07-21 1997-06-10 Motorola, Inc. Apparatus and method for deriving correspondence between storage elements of a first circuit model and storage elements of a second circuit model
US5654657A (en) 1995-08-01 1997-08-05 Schlumberger Technologies Inc. Accurate alignment of clocks in mixed-signal tester
US5862149A (en) 1995-08-29 1999-01-19 Unisys Corporation Method of partitioning logic designs for automatic test pattern generation based on logical registers
US5680332A (en) 1995-10-30 1997-10-21 Motorola, Inc. Measurement of digital circuit simulation test coverage utilizing BDDs and state bins
US5729554A (en) 1996-10-01 1998-03-17 Hewlett-Packard Co. Speculative execution of test patterns in a random test generator
US6175946B1 (en) 1997-10-20 2001-01-16 O-In Design Automation Method for automatically generating checkers for finding functional defects in a description of a circuit
US6292765B1 (en) 1997-10-20 2001-09-18 O-In Design Automation Method for automatically searching for functional defects in a description of a circuit
US6609229B1 (en) 1997-10-20 2003-08-19 O-In Design Automation, Inc. Method for automatically generating checkers for finding functional defects in a description of a circuit
US7007249B2 (en) * 1997-10-20 2006-02-28 Tai An Ly Method for automatically generating checkers for finding functional defects in a description of circuit

Non-Patent Citations (99)

* Cited by examiner, † Cited by third party
Title
Aagaard, Mark D., et al, "The Formal Verification of a Pipelined Double-Precision IEEE Floating-Point. Multiplier", 1995 IEEE/ACM International Conference on Computer-Aided Design, Nov. 5-9, 1995, pp. 7-10.
Abadir, M., et al., "Logic Design Verification via Test Generation", IEEE Transactions on Computer-Aided Design, vol. 7, No. 1, Jan. 1988, pp. 138-148.
Aharon, A., et al., "Test Program Generation for Functional Verification of Power PC Processors in IBM", 32nd Design Automation Conference, San Francisco, CA, Jun. 12-16, 1995, pp. 279-285.
Amato et al., "Checking Linked Data Structures", IEEE, pp. 164-173, 1994.
Aziz, A., et al., "HSIS: A BDD-Based Environment for Formal Verification", 31st Design Automation Conference, San Diego, CA, Jun. 6-10, 1994, pp. 454-459.
Balarin, F., et al., "Formal Verification of Embedded Systems based on CFSM Networks", 33rd Design Automation Conference, Las Vegas, NV, 1996, 568-571.
Beatty, Derek L., "Formally verifying a microprocessor using a simulation methodology", 31st Design Automation Conference, San Diego, CA, Jun. 6-10, 1994, pp. 596-602.
Beer, Ilan, et al., "Methodology and System for Practical Formal Verification of Reactive Hardware", 6th International Conference, CAV '94, Jun. 21-23, 1994, Proceedings, pp. 183-193.
Beer, Ilan, et al., "Rule-Base: an Industry-Oriented Formal Verification Tool", 33rd Design Automation Conference, Proceedings 1996, 655-660.
Behcet, S., et al., "A Test Design Methodology for Protocol Testing", IEEE Transactions on Software Engineering, vol. SE-13, No. 5, May 1987, pp. 518-531.
Belt, J. E., "An Heuristic Search Approach to Test Sequence Generation for AHPL Described Synchronous Sequential Circuits", Ph.D. Thesis, University of Arizona, 1973.
Benso, et al., "Exploiting HDLs for Circuits Fault Tolerance Assessments", IEEE, pp. 212-216, 1997.
Blum, M. et al., "Software Reliability via Run-Time Result-Checking", Proc. 35th IEEE FOCS, 1994.
Bombana, M., et al., "Design-Flow and Synthesis for ASICs: a case study", 32nd Design Automation Conference, Jun. 12-16, 1995, pp. 292-297.
Borgmann, J., et al., "Model Checking in Industrial Hardware Design", 32nd Design Automation Conference, San Francisco, CA, Jun. 12-16, 1995, pp. 298-303.
Bormann, Jorg, et al., "Model Checking in Industrial Hardware Design", 32nd Design Automation Conference, San Francisco, CA, Jun. 12-16, 1995, pp. 298-303.
Borrione, D., et al., "HDL-Based Integration of Formal Methods and CAD Tools in the PREVAIL Environment", Formal Methods in Computer-Aided Design, First International Conference, FMCAD '96 Palo Alto, CA, Nov. 6-8, 1996, pp. 451-467.
Brayton, R. K., et al., VIS First International Conference Formal Methods in Computer Aided Design, FMCAD'96, Palo Alto, CA, Nov. 1996, pp. 248-256.
Bryant, R. E., "Binary Decision Diagrams and Beyond: Enabling Technologies for Formal Verification", IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA, Nov. 5-9, 1995, pp. 236-243.
Burch, J. R., "Techniques for Verifying Superscalar Microprocessors", 33rd Design Automation Conference, Las Vegas, NV, Proceedings 1996, pp. 552-557.
Burch, J. R., et al., "Symbolic Model Checking: 1020 States and Beyond", Information and Computation, 1998, pp. 142-170.
Burch, Jerry R., et al., "Automatic Verification of Pipelined Microprocessor Control", Computer Aided Verification, 6th International Conference, CAV'94, Stanford, CA, Jun. 21-23, 1994 Proceedings, pp. 69-80.
Campos, S., et al., "Verifying the Performance of the PCI Local Bus using Symbolic Techniques", International Conference on Computer Design: VLSI in Computers & Processors, Oct. 2-4, 1995, Austin, Texas, pp. 72-78.
Caporossi et al., "Rule Checking at the Register Level", IEEE Spectrum, pp. 72-73, 1996.
Carmurati et al., "Efficient Verification of Sequential Circuits on a Parallel System", Proc. Third European Conference on Design Automation, pp. 64-68, Mar. 1992.
Chandra, A. K., et al., "Architectural Verification of Processors Using Symbolic Instruction Graphs", Computer Science, Feb. 9, 1994, pp. 1-23.
Chechik, M., et al., "Automatic Verification of Requirements Implementation", Proc. 1994 Internatinal Symposium on Software Testing and Analysis (ISSTA), Seattle, WA, Aug. 1994, pp. 109-124.
Cheng, K. T., "Automatic Functional Test Generation Using The Extended Finite State Machine Model", 30th Design Automation Conference, Dallas, Texas, Jun. 14-18, Proceedings 1993, pp. 86-91.
Cheng, Kwang-Ting, "Automatic Generation of Functional Vectors Using the Extended Finite State Machine Model", 33rd Design Automation Conference, Las Vegas, NV, Proceedings 1996, pp. 57-78.
Chian-Min Richard Ho, "Validation Tools For Complex Digital Designs", PhD Dissertation, Stanford University, Nov. 1996, pp. 6-15.
Clarke, E. M., "Representing Circuits More Efficiently in Symbolic Model Checking", 28th ACM/IEEE Design Automation Conference, Jun. 17-21, 1991, pp. 403-407.
Clarke, E. M., et al., "Efficient Generation of Counterexamples and Witnesses in Symbolic Model Checking", 32nd Design Automation Conference, Jun. 12-16, 1995, pp. 427-432.
Clarke, Edmund M., et al., "Model Checking and Abstraction", ACM Press Conference Record of the Nineteenth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Jan. 19-22, 1992, pp. 343-354.
Daga, A., "A Symbolic-Simulation Approach to the Timing Verification of Interacting FSMs", International Conference on Computer Design: VLSI in Computers & Processors, Oct. 2-4, 1995, 584-589.
DeMillo, Richard A., et al., "Software Testing and Evaluation", Software Engineering Research Center, Georgia Institute of Technology, 1997.
Deutsch, M. S., "Software Verification and Validation", Prentice-Hall, Englewood Cliffs, NJ, 1982.
Devadas et al., "An Observability-Based Code Coverage Metric for Functional Simulation", IEEE 1996, pp. 418-425.
Devadas, S., et al., "An Observability-Based Code Coverage Metric for Functional Simulation", IEEE/ACM International Conference on Computer-Aided Design, Nov. 10-14, 1996, pp. 418-425.
Eiriksson, Asgeir T., "Integrating Formal Verification Methods with A Conventional Project Design Flow", 33rd Design Automation Conference, Las Vegas, NV, Proceedings 1996, pp. 666-671.
Fallah, F., et al., Functional Vector Generation for HDL models Using Linear Programming and 3-Satisfiability, believed to be prior to Oct. 1997.
Forghani, B. et al., "Semi-automatic test suite generation from Estelle", Software Engineering Journal, Jul. 1992, pp. 295-307.
Fuchs, N. E., "Specifications are (preferably) executable", Software Engineering Journal Sep. 1992, pp. 323-334.
Fujiwara, S., et al., "Test Selection Based on Finite State Models", IEEE Transactions on Software Engineering, vol. 17, No. 6, Jun, 1991, pp. 591-603.
Geist et al., "Coverage-Directed Test Generation Using Symbolic Techniques", pp. 142-158, First Int'l Conference FMCAD '96 Palo Alto, CA USA, Nov. 6-8, 1996 Proceedings.
Goel, P., "An Implicit Enumeration Algorithm to Generate Tests for Combinational Logic Circuits", IEEE Transactions on Computers, vol. C-30, No. 3, Mar. 1981, pp. 215-222.
Gregory, B., et al., "Method for processing a hardware independent user description to generate logic circuit elements including flip-flops, latches, and three-state buffers and combinations thereof", http://patent.womp.ent.number-5661661, believed to be prior to Oct. 1997.
Groz, R., et al., "Attacking A Complex Distributed Algorithm from Different Sides: An Experience with Complementary Validation Tools", Proc. IFIP WG 6.1 Fourth International Workshop on Protocol Specification, Testing and Verification Skytop Lodge, Pennsylvania, Jun. 1984, pp. 315-331.
Hastings, R., "Method and apparatus for modifying relocatable object code files and monitoring programs", http://patent.womp...ent-number-5535329, believed to be prior to Oct. 1997.
Hastings, R., "Method for inserting new machine instructions into preexising machine code to monitor preexitsting machine access to memory", http://patent.womp...ent-number-5335344, believed to be prior to Oct. 1997.
Heinrich, M. et al.; "Hardware/Software Co-Design of the Stanford FLASH Multiprocessor"; Proceedings of the IEEE. vol. 85, No. 3; Mar. 1997; pp. 455-466.
Ho et al., "Architecture Validation for Processors", Proceedings 22nd Annual Internationals, Symposium on Computer Architecture, Jun. 22-24, 1995, IEEE Computer Society, pp. 404-413.
Ho et al., "Validation Coverage Analysis for Complex Digital Designs", IEEE/ACM International Conference On Computer-Aided Design, Nov. 10-14 1996, pp. 146-151.
Ho, Chian-Min Richard, "Validation Tools For Complex Digital Designs", A Dissertation Submitted to the Department of Computer Science and the Committee on Graduate Studies of Stanford University in Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy, Nov. 1996.
Hoskote, Y. V., et al., "Automatic Extraction of the Control Flow Machine and Application to Evaluating Coverage of Verification Vectors", International Conference on Computer Design: VLSI in Computers & Processors, Oct. 2-4, 1995, pp. 532-537.
Hoskote, Y. V., et al., "Automatic Verification of Implementations of Large Circuits Against HDL Specifications", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 16, No. 3, Mar. 1997, pp. 217-228.
Hsiao, M. S., et al., "Application of Genetically Engineered Finite-State-Machine Sequences to Sequential Circuit ATPG", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 17, No. 3, Mar. 1998, pp. 239-254.
http://www.pure.com, Purify User's Guide, Version 4.0, believed to be prior to Oct. 1997.
http://www.synopsys.com/pubs/JHLD/JHLD-099402, System Design and Validation, believed to be prior to Oct. 1997.
http:www.parasoft.com, "Insure++ Getting Started Version 3.0.1", believed to be prior to Oct. 1997..
Huey, B. M., "Search Directing Heuristics for the Sequential Circuit Test Search System (SCIRTSS)", Ph.D. Thesis, University of Arizona, 1975.
Jones et al., "The Automatic Generation of Functional Test Vectors for Rambus Designs", 33rd Design Automation Conference IEEE Circuits & Systems Society, 1996.
Jones, K. D., et al., "The Automatic Generation of Functional Test Vectors for Rambus Designs", 33rd Design Automation Conference, Las Vegas, NV, Proceedings 1996, pp. 415-420.
Jones, R., et al., "Self-Consistency Checking", Formal Methods in Computer-Aided Design, First International Conference, FMCAD '96, Palo Alto, CA, Nov. 6-8, 1996, pp. 158-171.
Jones, Robert B., et al., "Efficient Validity Checking for Processor Verification", IEEE International Conference on Computer-Aided Design, Nov. 5-9, 1995, pp. 2-6.
K.L. McMillan, "Fitting Formal Methods into the Design Cycle", 31st ACM/IEEE 1994, pp. 314-319.
Kant et al., "Synthesizing Robust Data Structures-An Introduction", IEEE Trans. On Computers, pp. 161-173, 1990.
Keutzer, K., "The Need for Formal Methods for Integrated Circuit Design", Formal Methods in Computer-Aided Design, First International Conference, FMCAD '96, Palo Alto, CA, Nov. 6-8, 1996, pp. 1-19.
Keutzer, K., "The Need for Formal Verification in Hardware Design and What Formal Verification Has Note Done for Me Lately", Workshop on the HOL Theorem Proving System and its Application, 1991, pp. 77-86.
Levitt, J., et al., "A Scalable Format Verification Methodology for Pipelined Microprocessors", 33rd Design Automation Conference, Proceedings 1996, pp. 558-563.
Lewin, D., et al., "A Methodology for Processor Implementation Verification", Formal Methods in Computer-Aided Design, First International Conference, FMCAD '96, Palo Alto, CA, Nov. 6-8, 1996, pp. 126-143.
Liang et al, "Identifying Invalid States for Sequential Circuit Test Generation", IEEE Trans. On Computer-Aided Design of Int. Circuits and Systems, vol. 16, Issue 9, pp.1025-1033, Sep. 1997.
Liang et al., "Identifying Invalid States for Sequential Circuit Test Generation", Proc. Of The Fifth Asian Test Symposium 1996, pp. 10-15, Nov. 1996.
Malley, Charles, et al., "Logic Verification Methodology for Power PC(TM) Microprocessors", 32nd Design Automation Conference, San Francisco, CA, Jun. 12-16, 1995, pp. 234-240.
Masud, M., et al., "Functional Test Using Behavior Models", Digest of Papers COMPCON Spring 1992, San Francisco, CA Feb. 1992, pp. 446-451.
Matsunaga, Y., "An Efficient Equivalence Checker for Combinational Circuits", 33rd Design Automation Conference, Las Vegas, NV, 1996 Proceedings, pp. 629-634.
McMillan, K. L., "Fitting Formal Methods into the Design Cycle", 31st Design Automation Conference, San Diego, CA, Jun. 6-10, 1994, pp. 314-319.
Miczo, A.., "Digital Logic Testing and Simulation", John Wiley & Sons, New York, NY, 1986.
Mihail, Milena, et al., "On the Random Walk Method for Protocol Testing", Computer Aided Verification, 6th International Conference, CAV '94, Stanford, CA, Jun. 21-23, 1994, pp. 133-141.
Moore, J. S., "Introduction to the OBDD Algorithm for the ATP Community", Technical Report 84, Oct. 1992.
Moundanos, D., "Abstraction Techniques for Validation Coverage Analysis and Test Generation", IEEE Transactions on Computers, vol. 47, Jan. 1998, pp. 2-14.
Naik, V. G., et al., "Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking", Computer Aided Verification, 6th International Conference, CAV '94, Stanford, CA, Jun. 21-23, 1994, pp. 195-206.
Narasimhan, Naren, et al., "Specification of Control Flow Properties for Verification of Synthesized VHDL Designs", Formal Methods in Computer-Aided Design, First International Conference, FMCAD '96, Palo Alto, CA, Nov. 6-8, 1996, pp. 326-345.
Nelson, B. E., et al., "Simulation Event Pattern Checking with PROTO1", Jun. 14, 1993.
Nurie, G. "Attain Testability With Hierarchical Design", Electronic Design, Jun. 27, 1991, pp. 89-99.
Ramalingam, T., et al., "On conformance test and fault resolution of protocols based on FSM model", Proceedings of the IFIP TC6 Working Conference on Computer Networks, Architecture and Applications, Networks '92, Trivandrum, India Oct. 28-29, 1992, pp. 221-223.
Sajkowski, M., "Protocol Verification Techniques: Status Quo and Perspectives", Proc. IFIP WG 6.1 Fourth International Workshop on Protocol Specification, Testing and Verifications, Skytop Lodge, Pennsylvania, Jun. 1984, pp. 697-720.
Santucci, J., et al., "Speed up of Behavioral A.T.P.G. Using a Heuristic Criterion", 30th Design Automation Conference, Dallas, Texas, Jun. 14-18, 1993, pp. 92-96.
Schlipf, T., et al., "Formal verification made easy", http://www.almaden...d/414/schlipf.html, believed to be prior to Oct. 1997.
Silburt, Allan, et al., "Accelerating Concurrent Hardware Design with Behavioral Modelling and System Simulation", 32nd Design Automation Conference, Jun. 12-16, 1995, pp. 528-533.
Singer, S. ; Vanetsky, L.; "Next Generation (NGTG) for Digital Circuits", Proceedings of IEEE Autotestcon, pp. 105-112, 1997.
Smith, S., et al., "Demand Driven Simulation: BACKSIM", 24th ACM/IEEE Design Automation Conference, Proceedings 1987, pp. 181-187.
Stornetta, T., et al., "Implementation of an Efficient Parallel BDD Package", 33rd Design Automation Conference, Las Vegas, NV, 1996, 641-644.
Torku, K. E., "Fault Test Generation for Sequential Circuits: A Search Directing Heuristic", Ph.D. Thesis, University of Oklahoma, 1979.
v. Bochman, G., "Usage of Protocol Development Tools: The Results of a Survey", Protocol IFIP WG 6.1, Seventh International Workshop on Protocol Specifications Testing and Verification, 1987, pp. 139-161.
v. Bochmann, G. et al., "Protocol Testing Review of Methods and Revelance for Software Testing", ACM Press, Proceedings of the 1994 International Symposium on Software Testing and Analysis (ISSTA), Seattle, Washington, Aug. 17-19, 1994.
Vincentelli et al., "Verification of Electronic Systems", 33rd Design Automation Conference, Las Vegas Proceedings 1996, pp. 106-111.
Vinnakota et al., "Design of Multiprocessor Systems for Concurrent Error Detection and Fault Diagnosis", IEEE, pp. 504-511, 1991.
Von Bochmann, G. "Concepts for Distributed Design", Springer-Verlag Berlin Heidelbeg New York, 1983.
Windley, Phillip J., "Formal Modeling and Verification of Microprocessors", IEEE Transactions on Computers, vol. 44, No. 1, Jan. 1995, pp. 54-72.

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070208548A1 (en) * 2006-03-03 2007-09-06 Solido Design Automation Inc. Modeling of systems using canonical form functions and symbolic regression
US8332188B2 (en) * 2006-03-03 2012-12-11 Solido Design Automation Inc. Modeling of systems using canonical form functions and symbolic regression
US20080127009A1 (en) * 2006-11-03 2008-05-29 Andreas Veneris Method, system and computer program for automated hardware design debugging
US7747971B1 (en) * 2007-06-30 2010-06-29 Cadence Design Systems, Inc. State retention for formal verification
US7617468B2 (en) * 2007-07-31 2009-11-10 Synopsys, Inc. Method for automatic maximization of coverage in constrained stimulus driven simulation
US20090037858A1 (en) * 2007-07-31 2009-02-05 Shashidhar Anil Thakur Method For Automatic Maximization of Coverage in Constrained Stimulus Driven Simulation
US20090171647A1 (en) * 2007-12-27 2009-07-02 Phanindra Mannava Interconnect architectural state coverage measurement methodology
US20090216513A1 (en) * 2008-02-27 2009-08-27 Dmitry Pidan Design verification using directives having local variables
US8219376B2 (en) * 2008-02-27 2012-07-10 International Business Machines Corporation Verification using directives having local variables
US20110029945A1 (en) * 2009-07-31 2011-02-03 Elliott B Alexander NetList Maintenance in a Circuit Diagram
US8756539B2 (en) 2009-07-31 2014-06-17 National Instruments Corporation NetList maintenance in a circuit diagram
US8352234B2 (en) * 2009-09-23 2013-01-08 International Business Machines Corporation Model generation based on a constraint and an initial model
US20110071809A1 (en) * 2009-09-23 2011-03-24 International Business Machines Corporation Model generation based on a constraint and an initial model
US8799850B2 (en) * 2009-10-29 2014-08-05 Synopsys, Inc. Simulation-based design state snapshotting in electronic design automation
US20110107293A1 (en) * 2009-10-29 2011-05-05 Synopsys, Inc. Simulation-based design state snapshotting in electronic design automation
US8185850B1 (en) * 2010-03-23 2012-05-22 Xilinx, Inc. Method of implementing a circuit design using control and data path information
US8869080B2 (en) 2012-09-26 2014-10-21 Apple Inc. Automatically identifying resettable flops for digital designs
US9734263B2 (en) * 2012-12-20 2017-08-15 Intel Corporation Method and apparatus for efficient pre-silicon debug
US10823782B2 (en) 2017-09-25 2020-11-03 International Business Machines Corporation Ensuring completeness of interface signal checking in functional verification
US10830818B2 (en) 2017-09-25 2020-11-10 International Business Machines Corporation Ensuring completeness of interface signal checking in functional verification

Also Published As

Publication number Publication date
US6885983B1 (en) 2005-04-26
US6292765B1 (en) 2001-09-18
US20050131665A1 (en) 2005-06-16

Similar Documents

Publication Publication Date Title
US7478028B2 (en) Method for automatically searching for functional defects in a description of a circuit
US7007249B2 (en) Method for automatically generating checkers for finding functional defects in a description of circuit
US6931611B2 (en) Design verification system for avoiding false failures and method therefor
US7379861B2 (en) Dynamic programming of trigger conditions in hardware emulation systems
US4727545A (en) Method and apparatus for isolating faults in a digital logic circuit
US6327556B1 (en) AT-speed computer model testing methods
US6993470B2 (en) Method of evaluating test cases in a simulation environment by harvesting
US7228262B2 (en) Semiconductor integrated circuit verification system
US20070005322A1 (en) System and method for complex programmable breakpoints using a switching network
CN117094269B (en) Verification method, verification device, electronic equipment and readable storage medium
US4791578A (en) Logic gate system design
CN112417798A (en) Time sequence testing method and device, electronic equipment and storage medium
US6707313B1 (en) Systems and methods for testing integrated circuits
US7210109B2 (en) Equivalence checking of scan path flush operations
US11216607B2 (en) Double glitch capture mode power integrity analysis
CN117350208A (en) Method and apparatus for checking performance of sequential logic element
US6789223B2 (en) Method for optimizing test development for digital circuits
US6493841B1 (en) Method and apparatus for determining expected values during circuit design verification
Kafka et al. FPGA-based fault simulator
Tuzov et al. Accurately simulating the effects of faults in vhdl models described at the implementation-level
Kim et al. Design for testability of protocols based on formal specifications
JPH08180095A (en) Delay fault simulation method and delay fault analyzing device
Zhengfei et al. A Novel On-Line Test Scheme for Avionics Controller Based on SBST
Zarrineh et al. A new framework for automatic generation, insertion and verification of memory built-in self test units
CN115629962A (en) Software self-test-based network-on-thousand-core-chip parallel online test method

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: 0IN DESIGN AUTOMATION, INC.,CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HO, CHIAN-MIN R.;MARDJUKI, ROBERT KRISTIANTO;DILL, DAVID LANSING;AND OTHERS;SIGNING DATES FROM 19980210 TO 19980227;REEL/FRAME:024263/0443

AS Assignment

Owner name: MENTOR GRAPHICS CORPORATION,OREGON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:0IN DESIGN AUTOMATION, INC.;REEL/FRAME:024278/0410

Effective date: 20041022

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210113